usb armory,Secondary development

chexinchexin Posts: 1 New Member
edited October 27 in Business Security

Our company intends to purchase usb armory. But now we have a problem. We intend to use usb armory as a trusted computing module to verify the trustworthiness of computers and certain programs. Therefore, whether usb armory supports secondary development and whether the secondary development is convenient is very important to us. Can you provide our company with a document for secondary development?

Answers

Sign In or Register to comment.