The IVE Host Checker feature simplifies secure remote access by ensuring endpoint security compliance. It can be used to verify third-party software compliance and application authenticity to prevent unauthorized access to the network. By integrating IVE into an SRC-managed environment, you can use the SRC software to monitor subscriber logins with the IVE to:
Based on the host-checking results, the subscriber may be allowed full, limited, or no access to the Internet.
You can deploy IVE Host Checker in a network so that it is activated: