08-12-2017, 02:10 AM
I have been asked by our security team the following question in relationship to ASG-Remote desktop:
How does the application protect the AES keys so that someone can’t get the password from the database and decrypt the information?
How does the application protect the AES keys so that someone can’t get the password from the database and decrypt the information?