In a distributed client/server computing environment, intruders can view or tamper with confidential data. To counteract this possibility, network-based security takes advantage of third-party distributed security software to authenticate users and protect data transmitted between machines on a network.