Allows to elaborate and guarantee the
application and the fulfillment of a complete security policy, composed
of rules that will define how, when, and what type of features each
employee is authorized to use.
Allows analysts to perform the
installation of programs without the need for physical and large-scale
displacement, with agility and generating the least impact to the
technological environment. Ensuring that users' work routine is not