When an integrator is selected to develop and deploy a security solution, the first step is to survey the edge assets the client seeks to connect in a converged system. Due to the variety of edge ...