PROTECTION.SIGNUP
Implementation
The implementation is carried out based on the identification data and the date set by the client. During the installation of the protection agents, the client must specify the following:
- Directories, files, or programs that need to be excluded from protection.
- Programs, websites, or USB ports/devices that need to be blocked.
These details can also be mentioned in the “Notes” field.
Suport / Incident response 24/7
- FAQ: For frequently asked questions and quick answers, please visit our FAQ section.
- E-mail: For commercial matters or other inquiries, contact us via email.
In Partnership with ThreatDown