Our security framework
- Rules
The golden rules for ensuring a secure remote connectivity experience. - Configurations
Configuration parameters that involve security in general. - Risks
Potential risks that need to be safeguarded against. - Actors
The actors involved in or affected by security breaches. - Expectations
Setting expectations for a more secure remote connectivity experience. - Commitments
Establishing an organization-wide security posture.