Hello,
I'm doing some due dilgence on the security features of the modules listed in the subject line. I was wondering if anyone can speak to the following (or refer me to someone who can):
--Do the modules listed above allow for user roles under the security functionality?
--What is the client? Web browser? Java client? Other?
--Are there service tree/business views?
--Is there true agentless monitoring?
I'm checking with the vendor but wanted the straight scoop as well.
Thanks,
Amy
TCC
I'm doing some due dilgence on the security features of the modules listed in the subject line. I was wondering if anyone can speak to the following (or refer me to someone who can):
--Do the modules listed above allow for user roles under the security functionality?
--What is the client? Web browser? Java client? Other?
--Are there service tree/business views?
--Is there true agentless monitoring?
I'm checking with the vendor but wanted the straight scoop as well.
Thanks,
Amy
TCC