No, we cannot reconstruct the calling pattern of any user. Once the scan is complete the collected data is deleted, and the findings related to suspicious attacks are only stored with us. Please refer to our data governance ...
Please refer to our privacy policy at https://assertion.cloud/privacyPolicy.html and terms of use at https://assertion.cloud/termsOfUse.html and EULA at https://assertion.cloud/sbcsEULA.html
The scanner utility uploads the SBC configurations related to secured remote working, trunk gateway, DoS/DDoS protection, secured reverse proxies, NIST standards. This data is required to enhance your protection against DoS/DDoS attacks, malware and ...