Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged Security

Rss Feed Group items tagged

tech writer

Sollensys | The Most Secure Online Blockchain Storage Services | sollensium - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

ISO/IEC 27017 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services. ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard. Guidelines for information security controls applicable to the provision and use of Cloud services. Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS). Useful for organizations evaluating the security posture of potential Cloud service providers. Available in hardcopy and PDF formats.
tech writer

Microsoft Windows Server 2022 Essentials - 0 views

  •  
    Windows Server 2022 provides advanced layered security, hybrid capabilities with Azure, and a flexible application platform. As part of this release, we are introducing Secured-Core capabilities to protect hardware, firmware, and Windows Server OS capabilities from advanced security threats. Secured-Core Server builds on technologies like Windows Defender System Guard and virtualization-based security to minimize the risk of firmware vulnerabilities and advanced malware. The new version also offers secured connectivity with several new features such as faster and more secure encrypted HTTPS connections, industry-standard SMB AES 256 encryption and more.
tech writer

Certified Cyber Security Foundation Training Course | IT Governance UK - 0 views

  •  
    From social engineering to security in the Cloud, learn the fundamentals of cyber security and how to protect your organization from threats. The industry-leading course for anyone looking to start a career in cyber security. Train with cyber security experts for a complete introduction to the cyber threat landscape, cybersecurity-related law, and incident response. Study from anywhere with our Live Online and Self-Paced options and keep travel and costs down. Learn more. Fully accredited by IBITGQ and (CIISec) Chartered Institute of Information Security. Successful completion of this one-day course and included exam awards the Certified Cyber Security Foundation (C CS F) qualification and 7 CPD/CPE points.
tech writer

GravityZone Security for Containers | Bitdefender Enterprise - 0 views

  •  
    Secure Linux and container deployments, including Docker and Kubernetes with GravityZone Security for Containers, our platform-agnostic, high-performance security solution. GravityZone Security for Containers provides platform-agnostic, high-performance security for containers, including Docker and Kubernetes, and Linux server workloads.
tech writer

ESET Secure Business - 0 views

  •  
    ESET Secure Business schließt alle Einfallstore für alle Arten von Bedrohungen wie Viren, Rootkits, Würmer und Spyware und filtert Spam effektiv heraus. Schützen Sie alle Computer, Laptops, mobilen Geräte und Dateiserver und verhindern Sie, dass Malware und Phishing-Nachrichten per E-Mail auf sie gelangen - mit Mail Security, das Ihr Netzwerk mit einer zusätzlichen Verteidigungslinie ausstattet. Erweitern Sie Ihre Mehrfachverteidigung auf neue Mitarbeiter und Geräte, indem Sie jederzeit Lizenzen hinzufügen. Egal ob Ihr Business neu gegründet oder bereits etabliert ist - in Sachen Sicherheitssoftware müssen im täglichen Einsatz bestimmte Erwartungen erfüllt werden. ESET weiß, dass eine Schutzlösung in Businessumgebungen unkompliziert und benutzerfreundlich sein sollte. Aus diesem Grund hat ESET Business Lösungen konzipiert, die sich für jede Unternehmensgröße eignen und viele Jahre Erfahrung in der Entwicklung wegweisender Antivirenprodukte nutzt. ESET Secure Business schließt sämtliche Einfallstore für alle Arten an Bedrohungen wie Viren, Rootkits, Würmer und Spyware und filtert effektiv Spam. Vertrauen Sie ESET.
tech writer

Bitdefender OEM Solutions for Gateway or Cloud-Based SDKs - 0 views

  •  
    Integrate OEM solutions into your product or service with Bitdefender's powerful security technology stack for network, gateway, or perimeter solutions. Augment your gateway security offering with Bitdefender's comprehensive stack of software development kits (SDKs). Bitdefender's proven technology is widely used by 150+ technology partners, protecting hundreds of millions of users globally. Consistent top rankings in AV-Test and AV-Comparatives evaluations with 100% detection rate in the real-world and zero false positives in the AV-Comparatives 2020 Business Security Test [gateway protection, gateway security, security sdk, network security SDK]
tech writer

ESET Multi-Device Security 2023, 5 devices, 1 year - 0 views

  •  
    Protect three or five devices with just one license - whether Mac, Windows, Android or Linux. With an ESET Multi-Device Security license, you have the freedom to combine the following products: Save Cash - With this license, you have all products in one box - and pay less than for individual licenses. You can transfer licenses to new devices at any time. One for all - Whether Windows, Mac, Linux or Android - with ESET Multi-Device Security you protect all devices with just one license. According to your needs - Choose how many devices you want to protect and download the ESET products you want - according to your requirements.. Utilities & Tools | Antivirus and data protection software. The perfect all-round protection for all devices! (Protection for 5 devices for 1 year). Protect five devices according to your needs: Whether computer, laptop (Windows, macOS, Linux), smartphone or tablet (Android). The ideal all-round protection in one box - with the best mix of security, speed and ease of use. Simply choose the right products from the ESET home user portfolio. Comprehensive protection for 5 devices for 1 year.
tech writer

Avast Premium Security 2023 - 0 views

  •  
    In today's world, effective virus protection is especially important. Reports of hacker attacks are increasing, which requires special protection for sensitive data. Therefore, in order for personal data to be truly protected, every computer user should buy an antivirus for their system. The Avast Premium Security 2022 tool provides the appropriate protection for desktop PCs and mobile devices. Avast Premium Security - detects brute force attacks and prevents them in advance; - detects and fixes known security holes in the operating system; - directly blocks all IP addresses that exploit RDP ports to spread malware.
tech writer

Avast Internet Security 2023 - 0 views

  •  
    Internet Security offers multiple layers of protection to keep you safe and your devices running smoothly. Each of the following advanced features is included in Internet Security software. Keep hackers on the other side of the wall with this essential security feature that monitors and controls incoming and outgoing traffic on your computer. Protect yourself from hackers who want to hijack your Domain Name System (DNS) settings, lure you to fake websites, and steal your banking details. WLAN Inspector automatically detects vulnerabilities in your private WLAN and uninvited guests who have gained access to your network. Detect and block viruses, malware, spyware, ransomware, and phishing. We use intelligent analysis to stop threats even before they can harm you. Detect and block suspicious behavior and provide zero-second protection against unknown threats and ransomware. Don't let ransomware and other untrusted apps modify, delete, or encrypt your photos and files.
tech writer

Sollensys - the first cybersecurity safety net built on the brilliance of blockchain te... - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

SMB-How it Works - Sollensys - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

ESET Server Security - 0 views

  •  
    Kaufen Sie ESET Server Security (ESET File Security) jetzt und sparen Sie! Wichtig: Sollten Sie sich für die Version Education, Gouvernment, Update oder Renewal entscheiden, muss der entsprechende Nachweis beim Kaufprozess angegeben/ oder hochgeladen werden. Ohne Nachweis kann Ihre Bestellung nicht bearbeitet werden. Leistungsstarker Schutz für alle Daten auf Dateiservern, Netzlaufwerken (z.B. OneDrive) und Mehrzweckservern in Ihrem Unternehmen. Schutz vor Ransomware. Zero Day-Erkennung. Vermeidung von Datenlecks. Schutz vor Botnets. Mit ESET können Sie Ihre Dateiserver in Echtzeit vor weit verbreiteter Malware schützen. Mit ESET File Security müssen Administratoren nicht mehr zwischen Leistung und Schutz wählen.
tech writer

Avast Essential Business Security - 0 views

  •  
    Avast Essential Business Security schützt Ihr Unternehmen vor Viren, Ransomware, Spyware, Zero-Second-Bedrohungen, Schwachstellen im Wi-Fi-Netzwerk und mehr. Schutz der Geräte. Egal, wo sich Ihre Mitarbeiter aufhalten und was sie online tun, Avast Essential Business Security sorgt für die Sicherheit Ihrer Geräte. Die preisgekrönte Technologie von Avast blockiert gefährliche Websites, stellt sicher, dass alle Dateien und E-Mails frei von Malware sind, verhindert, dass Hacker auf Ihr Gerät zugreifen, und vieles mehr. Datenschutz. Avast Essential Business Security schützt Ihr Unternehmen, Ihre Kunden und Ihre persönlichen Daten. Die Firewall- und Netzwerkinspektionstools von Avast blockieren Eindringversuche von Hackern und verhindern, dass sensible Daten die PCs Ihrer Mitarbeiter verlassen. Avast Software bietet umfassenden Schutz und zusätzliche Funktionen: Intelligenter Virenschutz: erkennt und blockiert Viren, Malware, Spyware, Ransomware und Phishing-Programme. CyberCapture: klassifiziert verdächtige Dateien und sendet sie bei Bedarf zur Analyse an ein Virenlabor. WLAN-Scanner: Spürt Schwachstellen im Netzwerk auf. Firewall: blockiert unzuverlässige Verbindungen. Web-Schutz: Blockiert verdächtige Websites E-Mail-Schutz: überprüft alle E-Mails auf Malware. Verhaltensschutz: Erkennt und blockiert verdächtiges Computerverhalten. Echte Website: Schützt vor Hackern, die Sie auf gefälschte Websites locken und Ihre Bankdaten stehlen wollen. Rettungstool: Erstellt ein sauberes Bootmedium mit einem Virenprüfprogramm, das Ihren Computer auf Dinge wie Rootkits untersucht.
tech writer

Symantec Norton Security 3.0 - 0 views

  •  
    Norton Security Standard offers comprehensive protection - recommended for your PC or Mac: Protects against viruses, spyware, malware, and other online threats. Protects your identity and online transactions. Best placed consumer safety service for your various devices. Contains Norton's anti-virus promises: From the time you subscribe to the product, a Norton expert is available to help you keep your device(s) free of viruses. Norton Security Deluxe protects all the data on your various devices. Protects multiple PCs, Macs, smartphones, and tablets. Provides an easy-to-use web portal that lets you conveniently manage protection for your various devices. Protects your online identity and transactions. Provides fast and powerful protection. Contains Norton's anti-virus promises: A Norton expert is available to help you keep your device(s) free of viruses. Norton Security Premium protects up to 10 devices. Protects multiple PCs, Macs, smartphones, and tablets with a single subscription. Provides an easy-to-use web portal that lets you conveniently manage protection for your various devices. Contains Norton's anti-virus promises: From the time you subscribe to the product, a Norton expert is available to help you keep your device(s) free of viruses. Does not include Backup Cloud and Parental Control.
tech writer

Avast Security Pro for Mac, 1 device 1 Year - 0 views

  •  
    Malware is not the only threat to your Mac. Your security can also be compromised by malicious websites and vulnerable wireless networks. Avast Security provides basic free protection against three threats. This new Pro version goes one step further and exposes WLAN intruders and puts a stop to ransomware. Avast Security Pro for Mac contents: -Protection against viruses and malware; -Protection from online threats; -WLAN vulnerability scanner; -PRO: Put a stop to WLAN intruders; -PRO: Bolt ransom goods.
tech writer

Bitdefender Sandbox Analyzer On-Premises Security Solution | Bitdefender Enterprise - 0 views

  •  
    Bitdefender Sandbox Analyzer is a next-gen sandbox security solution that enhances your enterprise cybersecurity against advanced sophisticated threats. Bitdefender Sandbox Analyzer is a security solution that enhances an organization's security posture against sophisticated or targeted attacks through advanced detection and reporting capabilities. Delivered as a virtual appliance, the solution can integrate into your existing security architecture or be combined with additional Bitdefender security layers. The solution can effortlessly scale up as your infrastructure evolves.
tech writer

Systems Security Professional Essentials Labs | Learning Tree - 0 views

  •  
    Systems Security Professional Essentials Labs | Learning Tree - CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
tech writer

The Art of Cyber Security - A practical guide to winning the war on cyber crime | IT Go... - 0 views

  •  
    This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry. A comprehensive and well-researched review of how cyber security and data protection is perceived by industry practitioners and the public. Challenges readers to reconsider the discipline of cyber security and view it from a fresh perspective. Analyses Sun Tzu's The Art of War and how Tzu's teachings can be applied to cyber security.
tech writer

Cloud Security Toolkit - ISO 27017 & ISO 27018 | IT Governance UK - 0 views

  •  
    Start the journey to ISO 27017 and ISO 27018 compliance for Cloud services security with customizable templates, documents, policies, and records. Designed to integrate with our ISO 27001 DocumentKits toolkit to ensure you have complete control over the security of your Cloud services. Get professional guidance and become an expert in securing your Cloud services, putting you fully in control of managing your information security. Guarantee full coverage of ISO 27017 and ISO 27018 with comprehensive documentation covering topics including backup and restoration, compliance checking, information security planning, and risk assessments. Reduce your implementation costs and time spent generating your documentation.
‹ Previous 21 - 40 of 564 Next › Last »
Showing 20 items per page