Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged report

Rss Feed Group items tagged

tech writer

Web Application Security is a Stack | IT Governance UK - 0 views

  •  
    IT Governance - the one-stop-shop for IT Governance - everything to do with IT Governance, including books, tools, learning, and consultancy so that your organization can compete and win in today's world. Corporate governance concepts plans, Turnbull report combined code, IT Governance information security management, Sarbanes Oxley, SOX, ISO27001, risk, ERM Provides an overview of the main threats from web application attacks, helping readers to improve their cyber defenses.
tech writer

Microsoft Windows Server Remote Desktop Services 2016 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    Multilayer safety technology for reliable work - With the Windows Server 2016 and RDS Device CAL, you will experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Certified ISO 27001 Lead Implementer and Lead Auditor Combo Course | IT Governance UK - 0 views

  •  
    This 7.5 day combination package offers delegates the chance to attend our high level ISO 27001 ISMS Certified Lead Implementer Class and Certified ISMS Lead Auditor course, at an extra special discounted price. This specialist led course covers all the activities required to plan, implement and audit an ISO 27001-compliant information security management system (ISMS) Learn the skills to plan, execute and report second-party (supplier) and third-party (external and certification) audits. Train without the travel with our self-paced online or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty and cost of travel. The classroom/online courses offer you the option to attend in person or online, if circumstances change. Successful completion of the course and included exam leads to the ISO 17024-certificated ISO 27001 Certified Lead Implementer (CIS LI) and Lead Auditor (CIS LA) qualifications and 56 CPD/CPE points.
tech writer

CyberComply | IT Governance UK - 0 views

  •  
    CyberComply makes compliance with cyber security requirements and data privacy laws simple and affordable. Meet your compliance objectives quickly and affordably. Map documentation and data flows, conduct risk assessments and DPIAs (data protection impact assessments), track your compliance gaps, and record actions that are taken - all in one powerful tool. Comprises five fully integrated modules to improve efficiency and simplify compliance. Easily demonstrate GDPR compliance with advanced reports, dashboard views, and task allocation. Quickly act on data security risks by applying controls from built-in libraries. Now updated to reflect UK GDPR requirements. Deliver certainty about privacy compliance across your organization. Cloud-based solution. Single sign-on authentication tool. Available from as little as £199.95 per month. This is a subscription product that you can cancel at any time. (T&Cs apply)
tech writer

Cyber Essentials Plus Certification | IT Governance UK | IT Governance UK - 0 views

  •  
    This service is for organizations that have recently achieved Cyber Essentials certification and now want to achieve Cyber Essentials Plus certification. Upgrade your IASME Cyber Essentials certificate to Cyber Essentials Plus (conditions apply*): An IASME Cyber Essentials Plus certificate and report from one of the founding certification bodies that remains one of the largest in the UK today. An on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan offer a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment. Cyber Essentials certificates are valid for 12 months, in line with IASME requirements. This package is an annual subscription product, but you can cancel at any time. (T&Cs apply.)
tech writer

Cyber Essentials Plus - Get A Little Help | IT Governance UK - 0 views

  •  
    A complete package of products and services that will help an organization achieve certification to Cyber Essentials Plus. Achieve Cyber Essentials and Cyber Essentials Plus certification with a little help from IT Governance, one of the scheme's founding certification bodies that remains one of the largest in the UK. Receive IASME Cyber Essentials and Cyber Essentials Plus certificates and a report upon successful completion of all elements. Includes extra support if you do not have a technical background or find some of the self-assessment questions difficult to understand. Includes cyber insurance and one-to-one consultancy support to bolster your organization's commitment to baseline cyber security. Cyber Essentials Plus certification includes an on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan, which offer a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment. Consultancy support is on hand throughout your journey to make sure you achieve certification.
tech writer

Cyber Essentials Plus - Get A Lot of Help | IT Governance UK - 0 views

  •  
    Achieve certification to the Cyber Essentials Plus with this bespoke, on-site consultancy service. Achieve Cyber Essentials Plus certification with a lot of help from one of the founding Cyber Essentials certification bodies, which remains one of the largest in the UK. IASME Cyber Essentials and Cyber Essentials Plus certificates and report upon successful completion of all elements. One-to-one consultancy support throughout your Cyber Essentials project to make sure you are on track to achieve both levels of certification. Includes cyber insurance and one-to-one consultancy support, and will bolster your organization's commitment to baseline cyber security. Cyber Essentials Plus certification includes an on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan that offers a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment.
tech writer

Cyber Essentials and Cyber Essentials Plus Certification | IT Governance UK | IT Gover... - 0 views

  •  
    This service will help you achieve IASME-licensed Cyber Essentials and Cyber Essentials Plus certification. It includes: IASME Cyber Essentials and Cyber Essentials Plus certificates and a report from one of the founding certification bodies that remain one of the largest in the UK today upon successful completion of all elements; Free cyber insurance and support; An on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan that offers a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place; and A pre-test call to help you get prepared for your assessment.
tech writer

Microsoft Windows Remote Desktop Services 2012 Device CAL, RDS CAL, Client Access License - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to the conventional CALs. As a result, RDS users can access desktops, applications and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 a RDS Device CAL you experience a secure operating system whose resources are always and everywhere available. Microsoft has built in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defence. This multi-level defensive technology includes the intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consist, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Server Remote Desktop Services 2012 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 RDS Device CAL, you experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Avast Business Antivirus Pro - 0 views

  •  
    Centrally manage PCs, Macs and servers. User-friendly console. Combine different Avast antivirus programs and operating systems. Schedule tasks in advance to maintain control of all devices at all times. Block dangerous websites, set up templates, and group devices. Leverage comprehensive threat and malware reports. Invite other administrators and set personalized notifications. Enjoy even better customer service thanks to the chat function.
tech writer

Microsoft Windows 10 Enterprise - 0 views

  •  
    Microsoft Windows 10 - Features of the Enterprise Edition: In a company, several teams and employees are often involved in a project. It should be possible to exchange data and send information quickly and easily in everyday work. Efficient tools from Microsoft Windows 10 support employees in these work steps - collaboration is thus optimized. Among other things, the Microsoft Windows 10 Enterprise Edition contains the following functions: "Direct Acess" provides the company's mobile employees with secure and transparent access to the company's network. "AppLocker", the improved successor to SRP, prevents both the unwanted installation of malware and its launch. With the help of the "Device Guard" the allowed app sources can be defined. "Windows To Go" enables the installation of Windows 10 Enterprise on a USB stick. "Cortana" is Microsoft's language assistant that supports employees in a variety of activities. Among other things, it helps with appointment and task entries, e-mail management, synchronization with other platforms, and, if desired, also reports important appointments. "Whiteboard Preview" is a kind of digital canvas on which data and ideas can be summarized. With "OneNote", notes and additional information can be transmitted to colleagues across platforms. "Windows Analytics" helps employees to use and improve the system more efficiently. "Windows Autopilot" takes care of the pre-configuration of Windows 10 Enterprise, which is transferred directly to the PC from a cloud.
tech writer

Microsoft Windows Remote Desktop Services 2008, 1 Device CAL - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2008 RDS Device CAL, you experience a secure operating system, whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

TurboCAD 2020 Platinum, English | IMSI Design - 0 views

  •  
    TurboCAD 2020 Platinum - Premium, Professional 2D/3D CAD Software: Ready to use 2D/3D CAD for everyone. Complete 2D/3D design tools. Easy to learn and use. 3D printing features. Excellent file sharing. Architectural design tools. Photorealistic rendering, materials, and lighting. Photorealistic rendering, materials, and lighting. NEW! Repeat Last Command. NEW! Generate Weight Report.
tech writer

Microsoft Windows 10 Enterprise N - 0 views

  •  
    In a company, several teams and employees are often involved in a project. Exchanging data and sending information should be quick and easy in everyday work. Efficient tools from Microsoft Windows 10 support the employees in these steps - collaboration is thus optimized. Among other things, Microsoft Windows 10 Enterprise Edition includes the following features: "Direct Acess" provides the company's mobile employees with secure and transparent access to the company's network. "AppLocker", the improved successor to SRP, prevents both the unwanted installation of malware and its startup. With the help of the "Device Guard" the allowed app sources can be defined. "Windows To Go" enables the installation of Windows 10 Enterprise on a USB stick. "Cortana" is Microsoft's language assistant that supports employees in a variety of activities. For example, it helps with appointment and task entries, e-mail management, synchronization with other platforms, and, if desired, also reports important appointments. "Whiteboard Preview" is a kind of digital canvas on which data and ideas can be summarized. With "OneNote", notes and additional information can be transmitted to colleagues across platforms. "Windows Analytics" helps employees use and improve the system more efficiently. "Windows Autopilot" takes care of the pre-configuration of Windows 10 Enterprise, which is transferred from a cloud directly to the PC.
tech writer

Microsoft Windows 10 Enterprise N VDA - 0 views

  •  
    Windows 10 Enterprise guarantees data protection by protecting main data while shared between different devices. This powerful feature available in Windows 10 Enterprise enables users to involve in examination reports to detect problems. This extra data protection and security can protect corporate data within the workplace efficiently. Windows 10 Enterprise presents to its users the new Device Guard feature which can protect your device from malware and viruses attacks. Windows 10 Enterprise stops attackers from malicious threats. Also, Device Guard or protector uses the virtualization for security included in Windows 10 Enterprise to allow enterprise systems to detect trustworthy data.
tech writer

Business Applications | Microsoft 365 Courses | Learning Tree - 0 views

  •  
    Business Applications | Microsoft 365 | Learning Tree
tech writer

Business Applications | Power Platform Courses | Learning Tree - 0 views

  •  
    Business Applications | Power Platform | Learning Tree
‹ Previous 21 - 38 of 38
Showing 20 items per page