Support could be improved. Contacting support is a lengthy process for raising a case. Recently, while attempting to set up a customized CI checklist, I faced difficulties updating parameters and obtaining results. Each Control ID in the checklist required a separate case, which presented a significant challenge given the number of checks involved. If issues arise with these checks, we must raise cases. Despite providing documentation and evidence, we receive standard instructions to follow rules we've already adhered to, making the process repetitive.
Cloud and Data Center Security solutions protect critical infrastructure from cyber threats, ensuring data integrity and availability.
Solutions in this category focus on safeguarding cloud environments and data centers. They provide tools for monitoring, detecting, and mitigating risks. Users from leading organizations highlight the importance of robust security measures to protect sensitive information and maintain operational continuity.
What are the essential features?
...
Support could be improved. Contacting support is a lengthy process for raising a case. Recently, while attempting to set up a customized CI checklist, I faced difficulties updating parameters and obtaining results. Each Control ID in the checklist required a separate case, which presented a significant challenge given the number of checks involved. If issues arise with these checks, we must raise cases. Despite providing documentation and evidence, we receive standard instructions to follow rules we've already adhered to, making the process repetitive.