Active client free

broken image
broken image

This includes technologies deployed as software installations on VMs within VA-controlled cloud environments (e.g. The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA.

broken image

Please note that the implementation of mobile technology applications that operate on Mobile Operating Systems must be reviewed and approved by the Mobile Technology and Endpoint Security Engineering Team: This entry covers the Desktop Edition of this technology and not any mobile versions. This product can authenticate users to a number of desktop, network, and productivity applications. More information on the proper use of the TRM can be found on theĪctivClient integrates a company`s physical security solutions such as smart cards, Universal Serial Bus (USB) tokens, and other credentials.

broken image

Technologies must be operated and maintained in accordance with Federal and Department security and

broken image