Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged reports

Rss Feed Group items tagged

tech writer

All-in-One Property Management Software | RentRedi - 0 views

  •  
    All-in-one property management software for landlords. Easy to use with everything you need to manage properties. Landlords can collect rent online, screen tenants, send in-app notifications, list units, create reports, and manage maintenance. Live customer support. No minimums, unlimited units. Mobile Apps. New: RentRedi landlords can now offer credit boosting to tenants! When a tenant chooses to report on-time rent payments to TransUnion, Experian, and Equifax, they can boost their credit by as much as 26 points.
tech writer

ParagraphAI * Best AI Writing App * Free AI Writing Assistant Tool - 0 views

  •  
    Free AI writing assistant app ParagraphAI * AI writing software * AI content writer generates text, emails, articles, blogs, reports & essays. Harness the Limitless Potential of AI. ParagraphAI builds AI writing software with love. Developed by a team of expert engineers, designers, thought leaders, and students from Meta, MIT, OpenAI, and beyond.
tech writer

ParagraphAI is the #1 AI Writing Assistant for iOS, Android and Chrome Powered by GPT-3! - 0 views

  •  
    Free AI writing assistant app ParagraphAI * AI writing software * AI content writer generates text, emails, articles, blogs, reports & essays. Harness the Limitless Potential of AI. ParagraphAI builds AI writing software with love. Developed by a team of expert engineers, designers, thought leaders, and students from Meta, MIT, OpenAI, and beyond.
tech writer

Bitdefender GravityZone Email Security - Advanced Email Protection - 0 views

  •  
    GravityZone Email Security is a multi-layer cloud-based addon that ensures complete business email protection for Office 365 deployments against all cyber threats. GravityZone Email Security provides businesses comprehensive email security and protection from known and emerging threats, including impersonation attacks, Business Email Compromise (BEC), CEO fraud, phishing, ransomware, and more. For MSPs, the multi-tenancy management features, monthly licensing, and usage reports help streamline tasks and deliver operational efficiencies.
tech writer

Bitdefender Sandbox Analyzer On-Premises Security Solution | Bitdefender Enterprise - 0 views

  •  
    Bitdefender Sandbox Analyzer is a next-gen sandbox security solution that enhances your enterprise cybersecurity against advanced sophisticated threats. Bitdefender Sandbox Analyzer is a security solution that enhances an organization's security posture against sophisticated or targeted attacks through advanced detection and reporting capabilities. Delivered as a virtual appliance, the solution can integrate into your existing security architecture or be combined with additional Bitdefender security layers. The solution can effortlessly scale up as your infrastructure evolves.
tech writer

Avast Premium Security 2023 - 0 views

  •  
    In today's world, effective virus protection is especially important. Reports of hacker attacks are increasing, which requires special protection for sensitive data. Therefore, in order for personal data to be truly protected, every computer user should buy an antivirus for their system. The Avast Premium Security 2022 tool provides the appropriate protection for desktop PCs and mobile devices. Avast Premium Security - detects brute force attacks and prevents them in advance; - detects and fixes known security holes in the operating system; - directly blocks all IP addresses that exploit RDP ports to spread malware.
tech writer

ESET Mail Security Microsoft Exchange Server - 0 views

  •  
    Mail Security - ESET Mail Security. Spam filter - The spam filter works with our excellent scanning engine, which we are constantly improving and adapting. In this way, ESET Mail Security ensures that spam and other unwanted mail does not reach company mailboxes in the first place. Phishing Protection - Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked. Hybrid Office 365 Scan - Protects organizations that are hybrid with Microsoft Exchange. Convenient quarantine management - If an item is moved to the quarantine, the recipient receives a message and can - as well as the responsible administrator - delete or release the corresponding email. Administrators also have the option of receiving regular reports summarizing what has happened in the quarantine area. Unmatched speed - In order not to hinder business processes, a mail security product must work stably and quickly and at the same time be particularly powerful. ESET Mail Security is based on a 64-bit engine that enables even deep scans of large amounts of data to be completed in the shortest possible time. Malware protection - ESET Mail Security offers the highest level of security against dubious or dangerous mail attachments thanks to powerful malware protection. Rule system - Thanks to a wide range of possible rules, administrators can specify exactly which e-mails are automatically filtered and what should be done with them. Quarantine management via browser - If an item is moved to the quarantine, the recipient receives a message and can easily delete or release the corresponding e-mail via the browser. Cluster support - ESET solutions can be interconnected to share configurations, notifications, greylist databases and more. In addition, Windows Failover Clusters and NLB clusters are supported to conveniently manage enterprise-sized networks. Flexible and scalable - The components of ESET Mail Security can be installed
tech writer

ESET Small Business Security Pack - 0 views

  •  
    ESET Endpoint Security provides comprehensive online and offline protection for your business endpoints with proven antivirus, personal firewall, web control, client antispam and other security features. mobile security - Your tablet and smartphone fleet safely in use. Thanks to the call filter, you have both incoming and outgoing communication and thus the telephone bill under full control. The integrated Anti-Theft function allows you to locate missing devices and lock or delete data stored on them. File Security - Multiple award-winning technologies developed further for your server environment. ESET's protection modules offer first-class protection for your corporate communications and data while optimizing server performance. mail security - Developed on proven NOD32 technology, ESET protects your business-critical mail servers and ensures secure and smooth system operation. Thanks to the integrated anti-spam engine, your mailboxes remain clean down to the pores. remote administration Network security without high IT expenditure. With ESET Remote Administrator, you can easily manage, scan, report, and enforce corporate policies on thousands of endpoints from a single console.
tech writer

ISO 22301 BCMS Lead Auditor Module Training Course | IT Governance UK - 0 views

  •  
    In just three days, enhance your ISO auditing career by learning how to deliver ISO 22301 audits. Learn from the experts and gain the practical knowledge to plan, report and follow up on an ISO 22301:2019 audit in just three days. Enhance your ISO 27001 auditing career by delivering audits of an ISO 22301 BCMS (business continuity management system).  Please note that all attendees must have attended our Certified ISO 27001 ISMS Lead Auditor Training Course. Learn from anywhere with our Live Online and Self-Paced options that allow you to study your way, keeping travel and costs to a minimum. Find out more. Successful completion of this three-day course and included exam awards the Certified ISO 22301 BCMS Lead Auditor (CBC LA) qualification and 21 CPD points.
tech writer

Nuance Dragon NaturallySpeaking 13 Premium, 1 user, 1 device, DE, EN, FR - 0 views

  •  
    Nuance Dragon NaturallySpeaking 13 Premium is a Nuance speech program with high-quality standards. You can automatically transcribe texts spoken with the program from letter dictation to scientific reports while speaking. The Dragon NaturallySpeaking series is one of the most widely sold speech recognition software on the market, with each release setting new standards in the field. The latest version, Nuance Dragon 13, is no exception and offers users significant improvements over previous versions. Dragon NaturallySpeaking 13 Premium, for example, has a lower error rate thanks to improved speech recognition and can also be used to record text using wireless microphones such as Bluetooth microphones or PC microphones. You can dictate texts to the program in German as well as in English or French. It is then possible to have Dragon NaturallySpeaking 13 Premium dictated texts read aloud to you via the software to make corrections.
tech writer

Web Application Security is a Stack | IT Governance UK - 0 views

  •  
    IT Governance - the one-stop-shop for IT Governance - everything to do with IT Governance, including books, tools, learning, and consultancy so that your organization can compete and win in today's world. Corporate governance concepts plans, Turnbull report combined code, IT Governance information security management, Sarbanes Oxley, SOX, ISO27001, risk, ERM Provides an overview of the main threats from web application attacks, helping readers to improve their cyber defenses.
tech writer

Microsoft Windows Server Remote Desktop Services 2016 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    Multilayer safety technology for reliable work - With the Windows Server 2016 and RDS Device CAL, you will experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Certified ISO 27001 Lead Implementer and Lead Auditor Combo Course | IT Governance UK - 0 views

  •  
    This 7.5 day combination package offers delegates the chance to attend our high level ISO 27001 ISMS Certified Lead Implementer Class and Certified ISMS Lead Auditor course, at an extra special discounted price. This specialist led course covers all the activities required to plan, implement and audit an ISO 27001-compliant information security management system (ISMS) Learn the skills to plan, execute and report second-party (supplier) and third-party (external and certification) audits. Train without the travel with our self-paced online or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty and cost of travel. The classroom/online courses offer you the option to attend in person or online, if circumstances change. Successful completion of the course and included exam leads to the ISO 17024-certificated ISO 27001 Certified Lead Implementer (CIS LI) and Lead Auditor (CIS LA) qualifications and 56 CPD/CPE points.
tech writer

CyberComply | IT Governance UK - 0 views

  •  
    CyberComply makes compliance with cyber security requirements and data privacy laws simple and affordable. Meet your compliance objectives quickly and affordably. Map documentation and data flows, conduct risk assessments and DPIAs (data protection impact assessments), track your compliance gaps, and record actions that are taken - all in one powerful tool. Comprises five fully integrated modules to improve efficiency and simplify compliance. Easily demonstrate GDPR compliance with advanced reports, dashboard views, and task allocation. Quickly act on data security risks by applying controls from built-in libraries. Now updated to reflect UK GDPR requirements. Deliver certainty about privacy compliance across your organization. Cloud-based solution. Single sign-on authentication tool. Available from as little as £199.95 per month. This is a subscription product that you can cancel at any time. (T&Cs apply)
tech writer

Cyber Essentials Plus Certification | IT Governance UK | IT Governance UK - 0 views

  •  
    This service is for organizations that have recently achieved Cyber Essentials certification and now want to achieve Cyber Essentials Plus certification. Upgrade your IASME Cyber Essentials certificate to Cyber Essentials Plus (conditions apply*): An IASME Cyber Essentials Plus certificate and report from one of the founding certification bodies that remains one of the largest in the UK today. An on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan offer a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment. Cyber Essentials certificates are valid for 12 months, in line with IASME requirements. This package is an annual subscription product, but you can cancel at any time. (T&Cs apply.)
tech writer

Cyber Essentials Plus - Get A Little Help | IT Governance UK - 0 views

  •  
    A complete package of products and services that will help an organization achieve certification to Cyber Essentials Plus. Achieve Cyber Essentials and Cyber Essentials Plus certification with a little help from IT Governance, one of the scheme's founding certification bodies that remains one of the largest in the UK. Receive IASME Cyber Essentials and Cyber Essentials Plus certificates and a report upon successful completion of all elements. Includes extra support if you do not have a technical background or find some of the self-assessment questions difficult to understand. Includes cyber insurance and one-to-one consultancy support to bolster your organization's commitment to baseline cyber security. Cyber Essentials Plus certification includes an on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan, which offer a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment. Consultancy support is on hand throughout your journey to make sure you achieve certification.
tech writer

Cyber Essentials Plus - Get A Lot of Help | IT Governance UK - 0 views

  •  
    Achieve certification to the Cyber Essentials Plus with this bespoke, on-site consultancy service. Achieve Cyber Essentials Plus certification with a lot of help from one of the founding Cyber Essentials certification bodies, which remains one of the largest in the UK. IASME Cyber Essentials and Cyber Essentials Plus certificates and report upon successful completion of all elements. One-to-one consultancy support throughout your Cyber Essentials project to make sure you are on track to achieve both levels of certification. Includes cyber insurance and one-to-one consultancy support, and will bolster your organization's commitment to baseline cyber security. Cyber Essentials Plus certification includes an on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan that offers a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment.
tech writer

Cyber Essentials and Cyber Essentials Plus Certification | IT Governance UK | IT Gover... - 0 views

  •  
    This service will help you achieve IASME-licensed Cyber Essentials and Cyber Essentials Plus certification. It includes: IASME Cyber Essentials and Cyber Essentials Plus certificates and a report from one of the founding certification bodies that remain one of the largest in the UK today upon successful completion of all elements; Free cyber insurance and support; An on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan that offers a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place; and A pre-test call to help you get prepared for your assessment.
tech writer

Microsoft Windows Remote Desktop Services 2012 Device CAL, RDS CAL, Client Access License - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to the conventional CALs. As a result, RDS users can access desktops, applications and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 a RDS Device CAL you experience a secure operating system whose resources are always and everywhere available. Microsoft has built in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defence. This multi-level defensive technology includes the intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consist, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Server Remote Desktop Services 2012 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 RDS Device CAL, you experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
1 - 20 of 33 Next ›
Showing 20 items per page