Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged access

Rss Feed Group items tagged

tech writer

Introduction to Microsoft Access | Access Training | Learning Tree - 0 views

  •  
    Introduction to Microsoft Access | Access Training | Learning Tree - This hands-on Introduction to Microsoft Access course provides experience with the features & functionality of Access 2010. Attend in-class or online.
tech writer

Microsoft Windows Remote Desktop Services 2022, User CAL, RDS CAL, Client Access License - 0 views

  •  
    If you want to access Windows Server 2022 from the outside, you need a so-called Remote Desktop Service CAL, which is abbreviated as RDS CAL. This is a fixed part of the Microsoft licensing model that allows external access. With a Remote Desktop 2022 User CAL, it is possible to access the Win Server Standard 16/24 Core or the Win Server 2022 Datacenter 16/24. As with the Win Server 2022 Standard User CAL, access is bound to a user, not to the device used. This makes it best suited for users who regularly work on a specific endpoint device and thus need to access the server directly or indirectly.
tech writer

Microsoft Windows Server Remote Desktop Services 2016 User CAL, RDS CAL, Client Access ... - 0 views

  •  
    The Microsoft Windows Server Remote Desktop Services 2016 User CAL allows all existing services to be activated for a user, for example, to print stored files or to adjust the file storage. The number of linked devices is irrelevant here so that the person with access can always access the functions and applications in the form of Microsoft Windows Server Remote Desktop Services 2016 User CAL. This way, the settings around the licenses are specialized for one person, so that no third parties can access the contents of the server. More security is hardly possible on this basis.
tech writer

Microsoft Windows 10 Enterprise VDA, Download - 0 views

  •  
    VDA (Virtual Desktop Access) is required if virtual Windows desktops are to be accessed from non-Windows computers (Mac, Thin Client, etc.), for example: Execution of several Windows instances on your computer for testing and development. Running Windows 10 on servers in the data center or the Azure Cloud (VDI or Virtual Desktop Infrastructure). Roaming VDI. The virtual desktop is accessed from thin clients, tablets, and, for example, from home. Pure BYOD. employees use their virtual desktops exclusively from their own devices such as notebooks or tablets. External employees have access to a virtual desktop hosted in the data center.
tech writer

Microsoft Identity and Access Administrator Training (SC-300) | Learning Tree - 0 views

  •  
    Microsoft Identity and Access Administrator Training (SC-300) | Learning Tree - This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
tech writer

Identity and Access Management Training | Learning Tree - 0 views

  •  
    Identity and Access Management Training | Learning Tree - This identity & access management course will teach you to protect your IT resources. Learn Single Sign-On, PKI, Federated Identity Management & more!
tech writer

Complete Staff Awareness E-learning Suite | IT Governance UK - 0 views

  •  
    IT Governance's complete staff awareness e-learning suite is a cost-effective way of organizing all of your staff awareness training under one, manageable contract. Access all 11 of our staff awareness e-learning programs and two challenge games to train staff on best practice processes. Ensure staff can spot and respond to cyber security and privacy risks. Comply with data protection and information security legislation and standards. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts our programs are updated every three months to ensure the content remains relevant. Gain access to any new content we release throughout your year-long contract. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all of the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

Norton Life Lock Secure VPN - 0 views

  •  
    Help protect private information such as passwords, bank account information, and credit card details when you use your PC, Mac, or mobile device on public Wi-Fi networks. Highly secure encryption: Anonymous surfing. AD tracker blocker. Access while on the move. Highly secure encryption. Highly secure Wi-Fi encryption means you can use your Mac, PC, or mobile device to surf safely-even in public Wi-Fi hotspots and unsecured networks. Anonymous surfing: Surf the web anonymously so your online privacy is protected from online advertisers and other companies that want to track your activity. Access on the go: With Norton Secure VPN, you can access your favorite websites, videos, or apps even while traveling. Block Ad Tracking: Block unwanted tracking technologies to prevent online advertisers and other companies from tracking your activity online.
tech writer

Windows Server 2012 R2 User CAL - 0 views

  •  
    Whoever orders the Windows Server 2012 R2 User CAL receives the product key, which is necessary to activate the respective server operating system. Depending on the affinity, the owners of the Windows Server 2012 R2 User CAL can then decide how to distribute the accesses so that the employees can then also benefit from full access to the server. Cals are required for this purpose, i.e. they are licenses that enable the user, or several users, to log into the system properly. The so-called Client Access Licenses (CALs) make it possible that the respective users can be linked to the server. Industries are as diverse as the demands and needs of the PC users themselves, so it is more than convenient that the Windows Server 2012 R2 User CAL provides a multi-purpose solution for every industry. No matter whether it's the software industry, household shop, or online store, for every business it is indispensable to execute the administrative and computational processes on the PC. This gives bosses, management positions, and employees a clear overview, which also makes work on the PC much easier. This in turn leads to increased productivity and optimizes various business processes.
tech writer

Microsoft SQL Server 2017 Standard, 1 Device CAL - 0 views

  •  
    There is no fixed solution for use. Anyone can use the Microsoft SQL Server 2017 Device CAL in a way that enriches the work in the company. This makes the existing license products a good choice when it comes to secure and at the same time easy access to the system. For security, the choice of licensed versions is an excellent choice, so that adjustments to the technical solution can be made at any time. The associated expandability makes the Microsoft SQL Server 2017 Device CAL an extremely interesting product, as there are no restrictions on the device itself. For example, if access is from a linked company, a wide variety of users can access the device. This distinguishes the device solution from the implementation, which focuses on a fixed user.
tech writer

Windows Server 2019 User CAL - 0 views

  •  
    Thanks to Microsoft's clear licensing model, it is not difficult to acquire the appropriate licenses. There is a separate license for each server, which can be adapted functionally exactly to the implementation. The Microsoft Windows Server 2019 User CAL is then used to define a specific user to simplify implementation considerably. In this way, you can always find the right products directly from us, so that you can rely on a professional solution. The arranged access licenses then offer the right solution for all servers of an organization. Regardless of the device, the Microsoft Windows Server 2019 User CAL defines exactly one user who can access the systems. In this way, it can be effectively avoided that third parties also have access to the systems, and security is significantly reduced. With the appropriate product licenses from our shop, this does not become a problem.
tech writer

Microsoft Windows Remote Desktop Services 2022, Device CAL, RDS CAL, Client Access License - 0 views

  •  
    Unlike the Win Server 2022 Standard User CAL, which is the same as the Remote Desktop 2022 User CAL, this license is applied "per device". It is therefore not bound to a user, but a device or a client computer as soon as it connects to the server for the remote desktop session. Usually, a temporary license is issued. Once access is terminated, it can be reissued. This type of licensing allows the user to access the server directly or indirectly. However, it is also common to tie the remote session license directly to a device. This would make sense, for example, if employees work remotely all the time or are employed in a home office on certain days of the week. Otherwise, the "first-come-first-served" principle applies. Which form of licensing is relevant for the company depends on its prioritization and the circumstances at hand.
tech writer

Microsoft Windows Server 2022 User CAL - 0 views

  •  
    Microsoft's clear licensing model makes it easy to acquire the right licenses. Each server has its own license, which can be functionally tailored exactly to the application. The Microsoft Windows Server 2022 User CAL then ensures that a specific user is assigned to greatly simplify implementation. This means you can always find the right products directly from us, so you can rely on a professional solution. Clearly structured access licenses provide the right solution for all servers in an organization. Regardless of the device, the Microsoft Windows Server 2022 User CAL defines exactly one user who can access the systems. This effectively prevents third parties from accessing the systems and significantly reduces security. With the right product licenses from our shop, this will not be a problem.
tech writer

Bitdefender Home Network Support - Premium Services - 0 views

  •  
    Expert help for all the smart devices in your home: Computer tune-ups, optimizations, and virus removals. Smart device initial set-up and configuration. 24/7 direct access to phone and chat support. Access to professional personalized assistance for all your smart devices.
tech writer

LearningTree | Software Design & Development - 0 views

  •  
    Software Design & Development | Learning Tree - Create a more accessible online environment with the versatility and technical skills to perform a variety of tasks from every phase of the web development process. Get unlimited access to Software Design & Development training TODAY at one great rate with the Learning Tree+ Advantage Plan.
tech writer

Cyber Incident Response Annual Retainer - Gold | IT Governance UK - 0 views

  •  
    This service gives you priority access to our specialist Cyber Incident Response team, which means we can start working with you immediately to deal with the incident. With Cyber Incident Response Annual Retainer - Gold Service you can have peace of mind that when a cyber incident occurs you know exactly who to call for help. This service gives you priority access to our specialist Cyber Incident Response team, which means we can start working with you immediately to deal with the incident. The Cyber Incident Response Annual Retainer - Gold service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Security Complete E-Learning Suite | IT Governance UK - 0 views

  •  
    Access all four of IT Governance cyber security staff awareness e-learning courses and a game to train staff on best-practice approaches. Ensure staff can spot and respond to cyber security and privacy risks. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

Cyber Essentials Toolkit | IT Governance UK - 0 views

  •  
    This toolkit includes all the necessary procedures and processes for ensuring that the controls you are implementing are aligned to the requirements of the Cyber Essentials Scheme. Designed to reflect the requirements of the Cyber Essentials scheme. Built on expert knowledge from numerous cyber security implementation projects. Ensure that the controls you are implementing are aligned to the requirements of the Cyber Essentials scheme. Access, manage and amend your documents from anywhere with Internet access, via our DocumentKits platform. This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

ESET Mail Security Microsoft Exchange Server - 0 views

  •  
    Mail Security - ESET Mail Security. Spam filter - The spam filter works with our excellent scanning engine, which we are constantly improving and adapting. In this way, ESET Mail Security ensures that spam and other unwanted mail does not reach company mailboxes in the first place. Phishing Protection - Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked. Hybrid Office 365 Scan - Protects organizations that are hybrid with Microsoft Exchange. Convenient quarantine management - If an item is moved to the quarantine, the recipient receives a message and can - as well as the responsible administrator - delete or release the corresponding email. Administrators also have the option of receiving regular reports summarizing what has happened in the quarantine area. Unmatched speed - In order not to hinder business processes, a mail security product must work stably and quickly and at the same time be particularly powerful. ESET Mail Security is based on a 64-bit engine that enables even deep scans of large amounts of data to be completed in the shortest possible time. Malware protection - ESET Mail Security offers the highest level of security against dubious or dangerous mail attachments thanks to powerful malware protection. Rule system - Thanks to a wide range of possible rules, administrators can specify exactly which e-mails are automatically filtered and what should be done with them. Quarantine management via browser - If an item is moved to the quarantine, the recipient receives a message and can easily delete or release the corresponding e-mail via the browser. Cluster support - ESET solutions can be interconnected to share configurations, notifications, greylist databases and more. In addition, Windows Failover Clusters and NLB clusters are supported to conveniently manage enterprise-sized networks. Flexible and scalable - The components of ESET Mail Security can be installed
tech writer

Complete Self-Paced Online Training Course Suite | IT Governance UK - 0 views

  •  
    Access all ten of our self-paced, online training courses across the GDPR (General Data Protection Regulation), ISO 27001, ISO 22301, ITIL®, and more. A unique package of 11 self-paced online courses including GDPR, DPA 2018, CPRA, ISO 27001, ISO 22301, cyber security, CISMP, and ITIL® 4. Train your staff under one manageable contract with cost-effective annual licenses. Unlimited access to courses for 12 months, including new content released throughout the year. Work at your own pace with self-paced online training, a more affordable, flexible, and less disruptive way to study. Find out more. Successful completion of the courses and their exams will award qualifications from IBITGQ, BCS, The Chartered Institute for IT; and PeopleCert.
1 - 20 of 167 Next › Last »
Showing 20 items per page