A number of EIM products are offered as hosted solutions. This abdicates control and responsibility of essential security from the corporation and entrusts implementation and enforcement of security to a third party. This is an unacceptable alternative when the secure and reliable operation of EIM is crucial to the internal operation of a corporation. The location of Sonork EIM, behind the corporation's firewall, protects from outside attacks in a way that externally hosted services never could.
|