From feec12abea5f467d18e7792abe0afacc15be2e14 Mon Sep 17 00:00:00 2001 From: Stefan Pejcic Date: Wed, 28 Feb 2024 16:31:34 +0100 Subject: [PATCH] Update enterprise-security-features.tsx --- .../refine-theme/enterprise-security-features.tsx | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/documentation/src/refine-theme/enterprise-security-features.tsx b/documentation/src/refine-theme/enterprise-security-features.tsx index 4c6a59bb..ac27bad1 100644 --- a/documentation/src/refine-theme/enterprise-security-features.tsx +++ b/documentation/src/refine-theme/enterprise-security-features.tsx @@ -65,20 +65,20 @@ export const EnterpriseSecurityFeatures = ({ const list = [ { icon: , - title: "Achieve fine-grained access control", + title: "Secure by default", description: - "Native integrations to authorization services for out-of-the-box support of common access control models such as ACL, RBAC & ABAC models.", + "Enable Two Factor authentification, block IP addresses per domain, control remote MySQL access and SSH access.", }, { icon: , - title: "Self-host for compliance", + title: "Limit resource usage", description: - "Deploy to your own infrastructure without worrying about regulations, performance, and stability. Maintain your current security best practices with no compromises.", + "Restrict the number of websites, domains, or databases, while enforcing hard limits on CPU, memory, port speed, disk usage, and inodes.", }, { icon: , - title: "Effortlessly monitor your application", + title: "Monitor your server and users", description: - "Ready-made providers and components for audit logging and usage analytics.", + "Built-in features include logging user activity, visualizing website visitors, and analyzing resource usage.", }, ];