摘要 |
A system for managing network vulnerability. A monitoring device detects a network message transmitted by a network device requesting access to a network. An authentication server identifies a security feature of the network device transmitting the detected network message, applies a security rule to the network message to determine whether the security feature provides adequate protection, and if so, permits the network device to access the network.
|