September 5th, 2019 08:00

@kclowrie 

Is the strategy to continue using the Dell Security Management Server (formerly Dell Data Protection Server) to manage the keys for BLM or will you be removing the software entirely from the endpoint?

Based on this answer, I can give you a more accurate answer for number 2 as well. 

-Brian

L4 | Dell Data Security #IWork4Dell

No Events found!

Top