No.
Related Articles
How is the separation of customer workspaces ensured?
How does amaise ensure identity management and authentication?
How do we ensure security in the data center?
Does amaise have a requirements-compliant security monitoring system with defined interfaces (e.g., APIs, etc.), and is security incident reporting ensured according to customer requirements?
Are connections to other systems necessary? If yes, which systems and using which protocols?
