This programs can validate whether a user is logging in from a trusted PC.
Ensures that confidential information cannot be accessed by anyone but you.
Each Network Identity can be assigned its own icon.