Host did a great job dealing with some tough questions. I love the distributed monitoring model. No data is stored on the endpoint agent and the traffic that is generated is encrypted to the TE cloud. There aren’t inherit security issues with TE architecture. It comes down to best practices just like the components of any other network deployment.
Host did a great job dealing with some tough questions. I love the distributed monitoring model. No data is stored on the endpoint agent and the traffic that is generated is encrypted to the TE cloud. There aren’t inherit security issues with TE architecture. It comes down to best practices just like the components of any other network deployment.