Is the strategy to continue using the Dell Security Management Server (formerly Dell Data Protection Server) to manage the keys for BLM or will you be removing the software entirely from the endpoint?
Based on this answer, I can give you a more accurate answer for number 2 as well.
Brian Piatt
67 Posts
0
September 5th, 2019 08:00
@kclowrie
Is the strategy to continue using the Dell Security Management Server (formerly Dell Data Protection Server) to manage the keys for BLM or will you be removing the software entirely from the endpoint?
Based on this answer, I can give you a more accurate answer for number 2 as well.
-Brian
L4 | Dell Data Security #IWork4Dell