Slide 11
Slide 11 text
Security
Every
project
is
different:
• Is
the
device
connected
to
internet
(e.g.
private
network)?
• Can
the
user
install
applica,ons
outside
a
whitelist?
• Can
the
user
navigate
to
URL
outside
a
whitelist?
The
normal
best
prac,ces
plus:
• Applica,on
whitelist
• Data
Security
(FIPS
140-‐2)
at-‐rest
and
in-‐mo,on
• Threat
detec,on
(Roo,ng,
VPN,
open
networks,…)