Get expert insights and solutions to your toughest cybersecurity questions. Our specialists are here to help you tackle any challenge.
-
- Topic
- Voices
- Last Post
-
-
Does this data contain a list of CVEs? Does this data contain a list of CVEs?Does this data contain a list of CVEs?
- 2
-
Laws enabling the gov to access data In regards to laws, are there any Indian laws which enable the government to access any data from us?In regards to laws, are there any Indian laws which enable the government to access any data from us?
- 2
-
Schemes and Access matrix. Schemes and Access matrix. Cloud implementation. We don't need Ancor and DB elements, everything is located at IPS addresses “15.197.185.143 and 3.33.186.66“. Right?Schemes and Access matrix. Cloud implementation. We don't need Ancor and DB elements, everything is located at IPS addresses “15.197.185.143 and 3.33.186.66“. Right?
- 2
-
Best practices for VDI environment What are the best practices for working in a VDI environment? Is it possible to check the Golden Image? We are concerned that VDI machines will fill up licenses, since the lifespan of these machines is short and new ones are created regularly.What are the best practices for working in a VDI environment? Is it possible to check the Golden Image? We are concerned that VDI machines will fill up licenses, since the lifespan of these machines is short and new ones are created regularly.
- 2
-
Customer’s existing Proxy Will agents work correctly through the Customer's existing proxy? Are there any requirements or recommendations?Will agents work correctly through the Customer's existing proxy? Are there any requirements or recommendations?
- 2
-
Support When requesting support from you, where is this done from? India, Europe or another place?When requesting support from you, where is this done from? India, Europe or another place?
- 2
-
GDPR evaluation Have SecPod done a GDPR evaluation, and/or transfer impact assessment?Have SecPod done a GDPR evaluation, and/or transfer impact assessment?
- 2
-
SanerNow Highlight Any features of the product you want to highlight?Any features of the product you want to highlight?
- 2
-
Asset Count How does your service count the number of assets?How does your service count the number of assets?
- 2
-
Prioritizing Vulnerabilities How does the service prioritize vulnerabilities?How does the service prioritize vulnerabilities?
- 1
-
Operating system and Network devices covered Does the service cover Windows, Linux, Mac and network devices?Does the service cover Windows, Linux, Mac and network devices?
- 1
-
Features and Improvements Is it possible to request features and improvements?Is it possible to request features and improvements?
- 1
- 1
-
Minimum Asset Count What is the minimum asset count for one customer?What is the minimum asset count for one customer?
- 2
-
Severity of Vulnerabilitites Is it possible to adjust the severity of vulnerabilities per customer?Is it possible to adjust the severity of vulnerabilities per customer?
- 2
-
- You must be logged in to create new topics.