To stay updated on your favorite discussions, please create an account or log in. Then, click the Bookmark icon to subscribe and receive notifications.

usb armory,Secondary development

chexin
chexin Posts: 1 Security Scout
edited October 2020 in Business Suite

Our company intends to purchase usb armory. But now we have a problem. We intend to use usb armory as a trusted computing module to verify the trustworthiness of computers and certain programs. Therefore, whether usb armory supports secondary development and whether the secondary development is convenient is very important to us. Can you provide our company with a document for secondary development?

Answers

This discussion has been closed.

Categories