If you need to allow third parties access to IT services, you face a multitude of options to confidently control the identity of users. However, it is unlikely that you will have equal confidence in the health of their networks and devices.
Read our whitepaper (linked below) which explores how device identity and health measurements can apply to unmanaged supplier devices.