Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged provides

Rss Feed Group items tagged

tech writer

Cyber Incident Response Annual Retainer - Silver | IT Governance UK - 0 views

  •  
    Some information and cyber security frameworks require organizations to actively maintain communication and engagement with industry bodies and relevant service providers as part of their information security program. This subscription service provides evidence of initial engagement with GRCI Law as a provider of CIR services to help satisfy these requirements. The Cyber Incident Response Annual Retainer - Silver service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Nitro Pro 13, 20 users, multilingual - 0 views

  •  
    Nitro Pro 13 offers an easy-to-use interface that users of Microsoft products can quickly navigate. MS Office toolbars and shortcuts are integrated. A plug-in is available for Outlook. The tools currently in use are set in detail by the user in dialog boxes. When business users purchase Nitro Pro 13, they purchase the ability to digitally sign documents. Recipients, who also have a PDF program, conveniently counter-sign. In the free Nitro Cloud, digitally signed documents can be converted directly into Microsoft Office documents. The program can be accessed on desktop computers, in the browser, or on mobile devices. Nitro 13 also provides all the basic functions in the handy web application. From any file that can be printed, Nitro Pro 13 allows you to create a PDF. This includes Microsoft Office documents, images, PDF/A standards, and text formats. Users store the PDFs locally, at well-known cloud providers such as Google Drive and Dropbox, and in SharePoint directories. PDFs created with Nitro 13 Pro can be opened with any standard PDF program. Conversely, Nitro Pro 13 lets you convert PDFs into Microsoft Word files, Excel spreadsheets, or PowerPoint presentations. Users insert images and text from different windows into a PDF or transfer them from a PDF into Office documents. Multiple PDFs or other files are merged by users to create a single document in PDF format. Likewise, Nitro Pro 13 allows you to split PDFs or reorganize the pages in your document. Scanned documents are freely editable in terms of size, color, and layout. A practical function for companies is the creation of fillable forms. PDFs can be easily compared to identify differences in versions. This applies to texts and images. For the exchange of information, users make comments or markings in the documents. These are fully compatible with other PDF programs and therefore easily visible to other recipients. Replies to comments will be marked with the name of the author. Nitro 13 Pro will combine
tech writer

Nitro Pro 13, 1 user, Multilingual - 0 views

  •  
    Nitro Pro 13 offers an easy-to-use interface that users of Microsoft products can quickly navigate. MS Office toolbars and shortcuts are integrated. A plug-in is available for Outlook. The tools currently in use are set in detail by the user in dialog boxes. When business users purchase Nitro Pro 13, they purchase the ability to digitally sign documents. Recipients, who also have a PDF program, conveniently counter-sign. In the free Nitro Cloud, digitally signed documents can be converted directly into Microsoft Office documents. The program can be accessed on desktop computers, in the browser, or on mobile devices. Nitro 13 also provides all the basic functions in the handy web application. From any file that can be printed, Nitro Pro 13 allows you to create a PDF. This includes Microsoft Office documents, images, PDF/A standards, and text formats. Users store the PDFs locally, at well-known cloud providers such as Google Drive and Dropbox, and in SharePoint directories. PDFs created with Nitro 13 Pro can be opened with any standard PDF program. Conversely, Nitro Pro 13 lets you convert PDFs into Microsoft Word files, Excel spreadsheets, or PowerPoint presentations. Users insert images and text from different windows into a PDF or transfer them from a PDF into Office documents. Multiple PDFs or other files are merged by users to create a single document in PDF format. Likewise, Nitro Pro 13 allows you to split PDFs or reorganize the pages in your document. Scanned documents are freely editable in terms of size, color, and layout. A practical function for companies is the creation of fillable forms. PDFs can be easily compared to identify differences in versions. This applies to texts and images. For the exchange of information, users make comments or markings in the documents. These are fully compatible with other PDF programs and therefore easily visible to other recipients. Replies to comments will be marked with the name of the author. Nitro 13 Pro wil
tech writer

Cyber Incident Response Investigation | IT Governance UK - 0 views

  •  
    Does your organization need help to respond to or to answer questions regarding a cyber incident to satisfy internal or external demands? CIR Investigation service can provide your organization or other interested parties, such as insurance providers, with the necessary assurance that the incident is being dealt with quickly and efficiently. The Cyber Incident Response Investigation service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Microsoft Windows Server 2022 Standard - 0 views

  •  
    Windows Server 2022 improves security with new features, such as Secured-Core Server and Secured Connectivity. Secured-Core Server means our hardware partners have provided hardware, firmware, and drivers to help customers increase the security of their critical systems. IT and SecOps teams can ensure comprehensive security in their environment with Secured-core Server's advanced protection and proactive defense at all levels of hardware, firmware and virtualization. The Secured Connectivity in Windows Server 2022 provides another layer of security in transit. The new release provides a faster and more secure Hypertext Transfer Protocol Secure (HTTPS)-encrypted connection and industry-standard AES-256 encryption with support for the Server Message Block (SMB) protocol.
tech writer

Symantec Norton Security 3.0 - 0 views

  •  
    Norton Security Standard offers comprehensive protection - recommended for your PC or Mac: Protects against viruses, spyware, malware, and other online threats. Protects your identity and online transactions. Best placed consumer safety service for your various devices. Contains Norton's anti-virus promises: From the time you subscribe to the product, a Norton expert is available to help you keep your device(s) free of viruses. Norton Security Deluxe protects all the data on your various devices. Protects multiple PCs, Macs, smartphones, and tablets. Provides an easy-to-use web portal that lets you conveniently manage protection for your various devices. Protects your online identity and transactions. Provides fast and powerful protection. Contains Norton's anti-virus promises: A Norton expert is available to help you keep your device(s) free of viruses. Norton Security Premium protects up to 10 devices. Protects multiple PCs, Macs, smartphones, and tablets with a single subscription. Provides an easy-to-use web portal that lets you conveniently manage protection for your various devices. Contains Norton's anti-virus promises: From the time you subscribe to the product, a Norton expert is available to help you keep your device(s) free of viruses. Does not include Backup Cloud and Parental Control.
tech writer

EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide - 0 views

  •  
    This comprehensive manual will provide detailed insights into the EU GDPR and practical implementation advice on setting up and managing a privacy program. Save 10% on our book of the month for May: This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

ISO9001 (ISO 9001) Quality Management Systems (QMS) Requirements - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard in order to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organisation: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework, and is currently used by more than a million organisations worldwide. It sets the standard not only for quality management systems, but management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

Bitdefender GravityZone Cloud MSP Security Suite - 0 views

  •  
    GravityZone Cloud MSP Security - The most effective advanced protection for Managed Service Providers. Hardening and control, Next-gen AV, and EDR in a single console. GravityZone Cloud MSP Security is a multilayered security solution leveraging an extensive set of systems hardening, threat prevention, and detection technologies as well as machine learning and behavioral analysis to provide advanced attack protection. It enables MSPs to maximize remote work protection, build resilience against sophisticated ransomware attacks and breaches, and grow profits.
tech writer

NordVPN VPN provider with more than ten years of experience - 0 views

  •  
    Online security starts with a click. NordVPN encrypts your internet traffic and hides your IP and virtual location. With more than ten years of experience, NordVPN is a leading VPN provider. NordVPN gives you military-grade protection online, and you can access all your favorite sites without restriction. NordVPN encrypts your data, keeps your web activity private, and removes online content restrictions. NordVPN never logs your activity when using NordVPN servers, which are operated under the jurisdiction of Panama, where there are no mandatory data retention laws. So you can always trust your privacy to NordVPN. The NordVPN service allows you to connect to 4400+ servers in 62+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private, and helps bypass geographic content restrictions online.
tech writer

Bitdefender GravityZone Full Disk Encryption (FDE) - 0 views

  •  
    GravityZone Full Disk Encryption (FDE) encrypts your business-sensitive data ensuring data protection and compliance under a simple remote management interface. GravityZone Full Disk Encryption encrypts boot and non-boot volumes on fixed disks, desktops, and laptops and gives you simple remote management of the encryption keys. It provides centralized handling of the native device encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault and the diskutil command-line utility) to ensure optimal compatibility and performance.
tech writer

Information Security A Practical Guide - Bridging the gap between IT and management | I... - 0 views

  •  
    Provides an overview of basic information security practices that will enable your security team to better engage with their peers in to address the threats facing the organization as a whole. Information security a practical guide provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organization as a whole. If you're starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know.
tech writer

NIS Regulations - A Pocket Guide for Digital Service Providers | IT Governance UK - 0 views

  •  
    Gain a clear understanding of the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: Which DSPs (digital service providers) are within scope; The key requirements; and How guidance from international standards can assist with compliance.
tech writer

Cyber Incident Response Readiness Assessment | IT Governance UK - 0 views

  •  
    This assessment provides an impartial and detailed review of your organization's capacity to identify, contain, remediate and recover from a cyber incident so that you can be sure you have the appropriate capability in place should an incident occur. Cyber attacks and data breaches are inevitable so the speed and effectiveness of your reaction to an incident are critical. The faster and more effective your response, the more likely it is you can significantly reduce the impact of an incident. The threat landscape is constantly evolving, so you should make sure your organization is ready to deal with any incident. Our Cyber Incident Response Readiness Assessment can help make sure you have an effective cyber incident response capability in place. The Cyber Incident Response Readiness Assessment is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

ISO/IEC 27017 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services. ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard. Guidelines for information security controls applicable to the provision and use of Cloud services. Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS). Useful for organizations evaluating the security posture of potential Cloud service providers. Available in hardcopy and PDF formats.
tech writer

EU GDPR - An Implementation and Compliance Guide | IT Governance UK - 0 views

  •  
    EU General Data Protection Regulation (GDPR) - An implementation and compliance guide, fourth edition: This bestselling guide is the ideal companion for anyone carrying out a GDPR compliance project, providing comprehensive guidance and practical advice. Now in its fourth edition, this bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the Regulation, including: The GDPR in terms you can understand; The obligations of data controllers and processors; What to do about international data transfers; and Data subjects' rights and consent.
tech writer

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide, ... - 0 views

  •  
    This bestselling guide is the ideal companion for anyone carrying out a GDPR compliance project, providing comprehensive guidance and practical advice. Now in its fourth edition, this bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the Regulation, including: The GDPR in terms you can understand; The obligations of data controllers and processors; What to do about international data transfers; and Data subjects' rights and consent.
tech writer

ESET File Security for Microsoft Windows Server - 0 views

  •  
    File Security for Microsoft Windows Server provides advanced protection for your organization's data running across all general servers, network file stores including OneDrive, and multi-purpose servers to ensure business continuity: Ransomware Prevention. Zero-day threat detection. Data breach prevention. Botnet protection. A single layer of defense is not sufficient for today's ever-evolving threat landscape. All endpoint products are capable of detecting malware before execution, during execution, and after execution. An additional layer can be implemented in the form of cloud sandbox analysis with ESET Dynamic Threat Defense. By not focusing only on a specific part of the malware lifecycle, ESET can provide the highest level of protection possible.
tech writer

ISO27001/ISO27002 A Pocket Guide | IT Governance UK - 0 views

  •  
    Get a concise and accessible introduction to ISO27001 and ISO27002, allowing you to understand the benefits and features of an efficient Information Security Management System (ISMS). This indispensable pocket guide provides a useful overview of two important information security standards. Packed with practical advice for implementing an information security management system, you'll wonder how you coped without it. This indispensable pocket guide provides a useful overview of two important information security standards. Click here to buy
tech writer

ISO 9001 2015 Standard | IT Governance UK - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organization: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework and is currently used by more than a million organizations worldwide. It sets the standard not only for quality management systems but for management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement.
1 - 20 of 250 Next › Last »
Showing 20 items per page