Questions & answers
Is it possible for employees to visually follow the activities of external workers on the remote maintenance computers?
The virtual remote maintenance computers are turned off when they are not being used. Under circumstances, this can take a longer time, as there are no service requirements. How is the currency of the anti-virus software and pattern ensured?
Various system manufacturers/providers check the anti-virus pattern and approve them with a specified status for your systems. Can zedas®secure ensure the pattern approval for various facilities and systems?
Various system manufacturers/providers have concrete solutions of how to technically implement the remote service for your systems. Is zedas®secure in conflict with this?
The failure of a central solution such as zedas®secure would affect many systems. Can zedas®secure be established as highly available?
Can an act of cooperation from the system to be protected be integrated into the centrally-organised approval of the remote service access in zedas®secure?
Many technical IT security concepts are incomprehensible or shortened for non-specialists. Is there a glossary and understandable explanations?
Continue with: Profile | Services | Advantages | References | Glossary