Once installing Twilio and perimeter security to my machine with my Splunk enterprise, what do I do to configure perimeter security? There's no real guide on what to do afterward.
... View more
I plan to use perimeter security with a remote security system which will be sending data to a remote PC. Do both ends need to have perimeter security or only the remote PC end that will be interacting with the data?
... View more