How is IF-MAP secured?
A. As a critical component of the network security infrastructure, maintaining the security of IF-MAP is essential. Every IF-MAP request is encrypted and authenticated with the industry standard TLS (Transport Layer Security) protocol. Only authorized IF-MAP clients are allowed to access the MAP database and fine-grained access controls may be employed.