Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged compliance

Rss Feed Group items tagged

tech writer

Standards webshop from IT Governance - ISO, IEC and British Standards - 0 views

  •  
    Browse the leading Standards webshop. Cheap UK and international shipping and free Soft Skills resources and information. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

IT Governance: An International Guide to Data Security and ISO27001/ISO27002, Sixth Edi... - 0 views

  •  
    This is sixth edition of THE definitive guide to ISO27001 and ISO27002 compliant information security and management. New for 2015: the Sixth edition of the definitive guide to ISO 27001-compliant information security management by Alan Calder and Steve Watkins. The textbook for the Open University's postgraduate information security course. The recommended textbook for all IBITGQ ISO 27001 courses. Available in softcover or eBook format. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

ISO9001 (ISO 9001) Quality Management Systems (QMS) Requirements - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard in order to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organisation: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework, and is currently used by more than a million organisations worldwide. It sets the standard not only for quality management systems, but management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

Bitdefender GravityZone Full Disk Encryption (FDE) - 0 views

  •  
    GravityZone Full Disk Encryption (FDE) encrypts your business-sensitive data ensuring data protection and compliance under a simple remote management interface. GravityZone Full Disk Encryption encrypts boot and non-boot volumes on fixed disks, desktops, and laptops and gives you simple remote management of the encryption keys. It provides centralized handling of the native device encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault and the diskutil command-line utility) to ensure optimal compatibility and performance.
tech writer

EU GDPR - An international pocket guide to compliance | IT Governance UK - 0 views

  •  
    A clear, concise primer on the GDPR this pocket guide provides an overview of what you need to do to comply with the Regulation. Thrive under the GDPR (General Data Protection Regulation) wherever you are in the world. This pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond. It explains: The terms and definitions used within the GDPR in simple terms; The key requirements; and How to comply with the Regulation.
tech writer

ESET Endpoint Encryption Pro from 1 user, 1 Year - 0 views

  •  
    Simple and powerful encryption for businesses of all sizes Secure encryption of hard disks, removable media, files and email FIPS 140-2 validated 256-bit AES encryption for absolute security Hybrid, cloud-based management server for complete remote control of endpoint encryption keys and security policies Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT. How ESET encryption helps your business: Meet data security obligations by enforcing encryption policies without impacting productivity. Companies large and small benefit from low help desk costs and short deployment cycles. No other product comes close to ESET Endpoint Encryption in terms of flexibility or ease of use. The client side requires minimal user intervention and improves the compliance and security of our enterprise data from a single MSI package. The server side makes user and workstation management easy. It extends the protection of your business beyond the perimeter of your network.
tech writer

IT Governance - Governance, Risk Management and Compliance for Information Technology - 0 views

  •  
    The one-stop shop for cyber security and data privacy risk management solutions. 20% off site wide and an extra 20% off IT Governance training promotion
tech writer

Microsoft SQL Server 2019 Standard 2 Core - 0 views

  •  
    SQL Server 2019 delivers innovative security and compliance features, industry-leading performance, mission-critical availability, and advanced analytics for all your data workloads, now with built-in support for Big Data.
tech writer

Microsoft Exchange Server 2010 Standard - 0 views

  •  
    Microsoft Exchange 2010 is the latest version of Microsoft's top enterprise messaging and collaboration solution and the cornerstone of Microsoft's vision for unified communications. With the widest range of deployment options, amazing ease of use, and built-in information gap prevention and policy compliance capabilities, Exchange 2010 helps you achieve new levels of reliability and performance.
tech writer

Microsoft Exchange Server 2013 Standard - 0 views

  •  
    Microsoft Exchange 2013 Standard is the latest version of Microsoft's top enterprise messaging and collaboration solution and the cornerstone of Microsoft's vision for unified communications. With the widest range of deployment options, fantastic ease of use, and built-in information gap and compliance features, Exchange 2013 helps you achieve new levels of reliability and performance.
tech writer

ESET Secure Authentication - 0 views

  •  
    Leistungsstarke, einfach einzurichtende Multi-Faktor-Authentifizierung für Unternehmen jeder Größe. Die Unternehmen genießen folgende Vorteile: Vorbeugung von Datenschutzvorfällen. Erfüllung von Compliance-Anforderungen. Zentralisierte Steuerung über den Browser. Kann über das Mobiltelefon oder vorhandene HW-Token betrieben werden.
tech writer

In Hindsight: A compendium of Business Continuity case studies - 0 views

  •  
    Analyzes the causes and effects of poor disaster management. An essential guide for anyone working in business continuity planning or disaster recovery. Reveals the themes that contributed to major disasters from the last 30 years. Proposes measures that could have minimized the risks and consequences. Explains how you can avoid making similar mistakes, reduce risks, and enable faster recovery when things do go wrong [business continuity, BCM, disaster planning, disaster management, business continuity case study, case studies, disaster recovery]
tech writer

Certified Cyber Security Practitioner Training Course | IT Governance UK - 0 views

  •  
    Learn how to protect your organisation from cyber threats while operating within appropriate legal, regulatory and contractual frameworks with this 4-day course. Train with cyber security experts to gain the knowledge to assess cyber risk and manage the implementation of an effective cyber security programme. Industry-leading course designed to help you significantly enhance your career prospects as a cyber security manager. Learn from anywhere with this Live Online course or our Self-Paced option that allows you to study your way, keeping travel and costs to a minimum. Find out more. Successful completion of this four-day course and exam awards the Certified Cyber Security Practitioner (C CS P) qualification and 28 CPD/CPE points.
tech writer

Cyber Security for Executive Management Instructor-Led Online Course | IT Governance UK - 0 views

  •  
    Cyber security training for executive and board-level management. Learn the risks and impacts of threats, and your legal, regulatory and contractual obligations. Train with cyber security experts to get an understanding of your legal, regulatory and contractual responsibilities in relation to cyber security. Learn about the biggest threats in cyber security today and find out how you can mitigate the risk of cyber attacks. Unique three-hour instructor-led online awareness course. Learn from anywhere with our Live Online and Self-Paced options that allow you to study your way, keeping travel and costs down to a minimum.
tech writer

Cyber Security for IT Support Self-Paced Online Course | IT Governance | IT Governance UK - 0 views

  •  
    A complete introduction to cyber security risk awareness for your IT support department. Train with the experts for a complete introduction to cyber security for your IT support department. Industry-leading course designed to help you and your team understand the most common cyber security threats and vulnerabilities. Work at your own pace with self-paced online training, a more affordable, flexible and less disruptive way to study. Find out more. Learn from anywhere with our Self-Paced option which allows you to study your way, keeping travel and costs to a minimum.
tech writer

Cyber Security for Remote Workers Staff Awareness - LMS SCORM | IT Governance UK - 0 views

  •  
    Cyber Security for Remote Workers Staff Awareness - LMS SCORM Package: SCORM-compliant cyber security course for remote workers that you can easily upload to your own LMS. Enable your employees to stay cyber safe when working from home. Updated to cover the latest COVID-19 phishing attacks. Understand what simple security measures should be put in place to reduce the chance of employees falling victim to a cyber-attack or phishing scam. Ensure employees know what to do if they download a malicious attachment or click a suspicious link.
tech writer

Cyber Security for Executive Management Self-Paced Online Training Course | IT Governa... - 0 views

  •  
    Get an understanding of cyber threats and your legal, regulatory and contractual obligations for cyber security. Train with cyber security experts to get an understanding of your legal, regulatory and contractual responsibilities regarding cyber security. Learn about the biggest threats in cyber security today and find out how you can mitigate the risk of cyber attacks. Work at your own pace with self-paced online training, a more affordable, flexible, and less disruptive way to study. Find out more. Learn from anywhere with our Self-Paced and Live Online options that allow you to study your way, keeping travel and costs to a minimum.
« First ‹ Previous 61 - 80 of 256 Next › Last »
Showing 20 items per page