Capture Client Protecting Assets with Security Policies
Protection
Endpoints are where data is created and where it is accessed from, so every endpoint connected to a network—whether it is a PC, a tablet, or a smartphone—is a point of vulnerability. With one compromised endpoint, an entire infrastructure can be compromised. The priority then is to get the endpoint protected and monitored by Capture Client.
- Tenant Token
- Migrating Clients Across Regions
- Protecting Devices
- Reviewing Registered Devices
- Active Users
- Performing System Scan
Was This Article Helpful?
Help us to improve our support portal