Retention policies for data stored on the UTM can be configured by the customer. Visit our Sub-processor listing to find out more about sub-processors engaged by Sophos. See the relevant documents for those services. Sub-processorsĭata shared with some Sophos services may be handled by sub-processors. Where you configure the device to use external logging or monitoring services such as syslog of IPFIXĭata submitted to SophosLabs services is handled in accordance with the SophosLabs Information Security policy ().Reports regarding system errors that occur, that allow us to identify potential product issues before they become more serious.Application accuracy data about IPS and application classification which may be sent to SophosLabs to improve IPS detection. This is used to help us prioritize our development and support efforts.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |