Dear Retarus customers, Today, two major vulnerabilities in modern processor architectures have been made public («Meltdown» and «Spectre»). The safety of our customers always has top priority for us. That’s why we are already actively working to ensure that none of our customers are exposed to these vulnerabilities. In order to exploit the security holes, code must be executed locally. The servers of the Retarus infrastructure are largely isolated as run-through systems and have protective measures in place to prevent the execution of third-party code. However, we will of course keep our systems up to date and make every effort to avoid any interruptions to our services as far as possible. In any event, we will certainly inform you as usual about scheduled maintenance in advance of any activities. Greetings, Your Retarus Team Update from January 12, 2018: In the meantime, there is an official Retarus statement on Meltdown Spectre. You can download the PDF here.
Últimos artículos
- El grupo SRH protege sus sistemas de email con Retarus Email Security
- Ahora nuestro servicio Advanced Threat Protection protege aún más
- Límites de envío más estrictos para Exchange Online: repercusión de las nuevas reglas de Microsoft
- Desmantelamiento global de la RTC: el final está cerca
- El proveedor de logística alimentaria IFCO utiliza Retarus Cloud Fax
Siempre al día
¿Usted desea recibir información periódica de Retarus? Nuestro boletín de noticias le mantendrá siempre al día.
¡Suscríbase!
¡Suscríbase!
Sobre Retarus
Nuestra visión consiste en ser el proveedor líder mundial de servicios en la nube a nivel empresarial que posibilita una comunicación corporativa fiable, eficiente y conforme.
Más información
Más información