website/blogs: added emm dashes (#6927)
added emm dashes Co-authored-by: Tana Berry <tana@goauthentik.io>
This commit is contained in:
parent
e0328d8373
commit
70630aab3a
|
@ -25,7 +25,7 @@ image: ./image1.jpg
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Legacy security vendors that rely on black box development can't keep up with open source. It's an oft-discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions-but it is equally believed that "serious" security software companies have proprietary software.
|
Legacy security vendors that rely on black box development can't keep up with open source. It's an oft—discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software.
|
||||||
|
|
||||||
In this blog, we will take a closer look at the pros and cons of the various source availability types of SSO and other security software.
|
In this blog, we will take a closer look at the pros and cons of the various source availability types of SSO and other security software.
|
||||||
|
|
||||||
|
|
Reference in New Issue