Will the installation and use of Hyena compromise the security of my environment. For example, what authentication methods can be used to authenticate yourself to the Hyena application? Is the communications between client and server encrypted? What users rights are required to access the Hyena application? Does Hyena have auditing capabilities to log who logged-in, date and time, whhat systems they connected to, what functions they performed on those systems, etc.
Best Regards,
Louis
Best Regards,
Louis
Comment