usb armory,Secondary development

chexin
chexin W/ Alumni Posts: 1 Security Scout
edited October 2020 in WithSecure Business Suite

Our company intends to purchase usb armory. But now we have a problem. We intend to use usb armory as a trusted computing module to verify the trustworthiness of computers and certain programs. Therefore, whether usb armory supports secondary development and whether the secondary development is convenient is very important to us. Can you provide our company with a document for secondary development?

Answers

This discussion has been closed.