Ensure that only authorized people can access sensitive information on your computer.
Visual based, virtual computing environment.
Quickly identify devices and their IP addresses on your network.