Transparent Background:
Transparent Background:
By deploying Cells Enterprise on-premises or on your cloud of choice, you are choosing a security-by-design approach to keep full control and ownership of your company documents. However, the great power provided by Cells comes with great responsibility. A badly configured server can be a perfect backdoor for malicious attackers.
This document provides a guided tour of the most important aspects you have to take into account to make sure that your Cells Enterprise instance is ready for production in terms of security and compliance.
It covers topics such as :
Audience : Technical (DevOps, System Administrators)