I'd like some precisions or white paper about security in "Peregrine Automation desktop administration" software.
The key capabilities on in not descriptive: "Through implementation of an integrated management database, an extensive set of customizable security features provides an extremely secure environment for all remote communications beginning with log-on and continuing throughout the entire connection."
Thanks
Hervé
The key capabilities on in not descriptive: "Through implementation of an integrated management database, an extensive set of customizable security features provides an extremely secure environment for all remote communications beginning with log-on and continuing throughout the entire connection."
Thanks
Hervé