No.
Related Articles
How does the architecture of the amaise cloud platform look?
How is malware protection ensured?
How can it be ensured that only authorized devices can access the service (e.g., customer IDP, IP whitelisting)?
Are connections to other systems necessary? If yes, which systems and using which protocols?
At which service provider does amaise operate its infrastructure?