Zixi Security Best Practices
Configuring the Security Settings after Installation
1min
The following security procedure should be implemented following the installation and setup of all Zixi resources (Feeder, Broadcaster and Receiver).
-
The following security procedure should be implemented following the installation and setup of all Zixi resources (Feeder, Broadcaster and Receiver).
Copyright © Zixi LLC 2025