10
1
I
NTRODUCTION
An Up-To-Date System is a Secure System............................... 11
When Should You Use F-Secure Policy Manager Proxy?.......... 12
How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus
Proxy Different?.......................................................................... 14