Which appliance is supported as the replication target in the CR Vault?
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
A customer wants to use the service of an external network operation center (NOC) / security operation center (SOC) to monitor the CR Vault environment.
What is the most secure solution if the customer wants to ensure that communication is only possible to the NOC/SOC?