Skip to content
Home > FAQs > What are potential vulnerabilities when utilizing computational storage such as this?

What are potential vulnerabilities when utilizing computational storage such as this?

Category: Security

There aren’t really any new security vulnerabilities. The firmware is locked with no opportunity for users to modify it. The compression is done in a hardware engine, again not introducing any new attack vectors.

Did you find this FAQ helpful?
0
0

Leave a Reply

Your email address will not be published. Required fields are marked *

nv-author-image

Laura Balp

After almost 10 years in the B2B marketing field for tech companies, I use my skills in digital marketing to help companies like ScaleFlux thrive. On a personal note, I'm a curious and well traveled French woman living in the captivating city of San Francisco :)