Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items matching "companies" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
tech writer

IT Training Courses & Certifications | Learning Tree - 0 views

  •  
    Learning Tree provides award-winning IT training, certification & management courses. Attend online, in the classroom, on-demand, on-site, or as a blended solution. Learning Tree is a World-Class IT & Management Training company with an extensive course library taught by industry experts. Learning Tree is a Trusted Partner for over 65,000+ organizations and has helped more than 2.5 million individuals worldwide develop the skills to earn the certifications necessary to support their careers as IT Professionals & Managers.
tech writer

Linux Reseller Hosting - 0 views

  •  
    Reseller Hosting is a specialized web hosting service that allows you (the reseller) to purchase a hosting provider's resources wholesale and resell them to your clients for a profit. It is ideal for web developers, web design firms, SEO/marketing companies, and others that provide services to websites, as well as for web hosting entrepreneurs. Reseller hosting allows you to create your own, branded hosting service and your pricing structure.
tech writer

TIBCO Assessment Test [CCAT]: Overview & Sample Questions - 0 views

  •  
    This is a prep guide for the TIBCO assessment test, also known as the TIBCO CCAT test. Find out what to expect, try sample questions, and more. TIBCO is one of Vista Equity Partners' subsidiaries. Since all Vista's companies use the Criteria Cognitive Aptitude Test (CCAT) as an initial screening stage, TIBCO uses it as well. The TIBCO test includes 50 questions to be completed in 15 minutes (making it 18 seconds per question). The questions are divided into four main topics: Numerical Reasoning: Word Problems, Number / Letter Series, Table & Graphs. Verbal: Antonyms, Word Analogies, Sentence Completion. Spatial Reasoning: Next in Series, Odd one Out, Matrices. Logic: Syllogisms, Seating Arrangements, Error Checking.
tech writer

Cyber Incident Response Annual Retainer - Gold | IT Governance UK - 0 views

  •  
    This service gives you priority access to our specialist Cyber Incident Response team, which means we can start working with you immediately to deal with the incident. With Cyber Incident Response Annual Retainer - Gold Service you can have peace of mind that when a cyber incident occurs you know exactly who to call for help. This service gives you priority access to our specialist Cyber Incident Response team, which means we can start working with you immediately to deal with the incident. The Cyber Incident Response Annual Retainer - Gold service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Incident Response Annual Retainer - Platinum | IT Governance UK - 0 views

  •  
    An ongoing support service to ensure your organization can identify, contain, eradicate and recover from a cyber security incident. Cyber attacks and data breaches are inevitable, so the speed and effectiveness of your reaction to an incident are critical. The faster and more effective your response, the more likely it is you can significantly reduce the impact of an incident. The threat landscape is constantly evolving, so you should make sure your organization is ready to deal with any incident by having a well-rehearsed plan that is reviewed regularly and maintained. Our Cyber Incident Response Annual Retainer - Platinum service can help you be prepared. The Cyber Incident Response Annual Retainer - Platinum service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Incident Response Annual Retainer - Silver | IT Governance UK - 0 views

  •  
    Some information and cyber security frameworks require organizations to actively maintain communication and engagement with industry bodies and relevant service providers as part of their information security program. This subscription service provides evidence of initial engagement with GRCI Law as a provider of CIR services to help satisfy these requirements. The Cyber Incident Response Annual Retainer - Silver service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Incident Response Investigation | IT Governance UK - 0 views

  •  
    Does your organization need help to respond to or to answer questions regarding a cyber incident to satisfy internal or external demands? CIR Investigation service can provide your organization or other interested parties, such as insurance providers, with the necessary assurance that the incident is being dealt with quickly and efficiently. The Cyber Incident Response Investigation service is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Incident Response Readiness Assessment | IT Governance UK - 0 views

  •  
    This assessment provides an impartial and detailed review of your organization's capacity to identify, contain, remediate and recover from a cyber incident so that you can be sure you have the appropriate capability in place should an incident occur. Cyber attacks and data breaches are inevitable so the speed and effectiveness of your reaction to an incident are critical. The faster and more effective your response, the more likely it is you can significantly reduce the impact of an incident. The threat landscape is constantly evolving, so you should make sure your organization is ready to deal with any incident. Our Cyber Incident Response Readiness Assessment can help make sure you have an effective cyber incident response capability in place. The Cyber Incident Response Readiness Assessment is provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Incident Response Tabletop Exercises | IT Governance UK - 0 views

  •  
    Cyber attacks and data breaches are inevitable, but the faster and more effective your response, the more likely it is you can reduce the impact of an incident. The threat landscape is constantly evolving, so make sure your organization is ready to deal with any incident by independently testing your CIR (cyber incident response) capability. The Cyber Incident Response Tabletop Exercises are provided by IT Governance's sister company GRCI Law Limited, a specialist in data privacy, cyber security, and legal and compliance advisory services.
tech writer

Cyber Resilience Staff Awareness Suite - LMS SCORM Package | IT Governance UK - 0 views

  •  
    Educate employees on cyber security, cyber resilience, and data protection best practices and ensure everyone receives the same level and quality of training. SCORM-compliant cyber resilience staff awareness e-learning courses that you can upload to your LMS (learning management system). Ensure staff can adhere to cyber security (including phishing and ransomware), cyber resilience, and GDPR (General Data Protection Regulation) best practices. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

Cyber Security Complete E-Learning Suite | IT Governance UK - 0 views

  •  
    Access all four of IT Governance cyber security staff awareness e-learning courses and a game to train staff on best-practice approaches. Ensure staff can spot and respond to cyber security and privacy risks. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

Complete Staff Awareness E-learning Suite | IT Governance UK - 0 views

  •  
    IT Governance's complete staff awareness e-learning suite is a cost-effective way of organizing all of your staff awareness training under one, manageable contract. Access all 11 of our staff awareness e-learning programs and two challenge games to train staff on best practice processes. Ensure staff can spot and respond to cyber security and privacy risks. Comply with data protection and information security legislation and standards. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts our programs are updated every three months to ensure the content remains relevant. Gain access to any new content we release throughout your year-long contract. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all of the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

ESET Mail Security Microsoft Exchange Server - 0 views

  •  
    Mail Security - ESET Mail Security. Spam filter - The spam filter works with our excellent scanning engine, which we are constantly improving and adapting. In this way, ESET Mail Security ensures that spam and other unwanted mail does not reach company mailboxes in the first place. Phishing Protection - Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked. Hybrid Office 365 Scan - Protects organizations that are hybrid with Microsoft Exchange. Convenient quarantine management - If an item is moved to the quarantine, the recipient receives a message and can - as well as the responsible administrator - delete or release the corresponding email. Administrators also have the option of receiving regular reports summarizing what has happened in the quarantine area. Unmatched speed - In order not to hinder business processes, a mail security product must work stably and quickly and at the same time be particularly powerful. ESET Mail Security is based on a 64-bit engine that enables even deep scans of large amounts of data to be completed in the shortest possible time. Malware protection - ESET Mail Security offers the highest level of security against dubious or dangerous mail attachments thanks to powerful malware protection. Rule system - Thanks to a wide range of possible rules, administrators can specify exactly which e-mails are automatically filtered and what should be done with them. Quarantine management via browser - If an item is moved to the quarantine, the recipient receives a message and can easily delete or release the corresponding e-mail via the browser. Cluster support - ESET solutions can be interconnected to share configurations, notifications, greylist databases and more. In addition, Windows Failover Clusters and NLB clusters are supported to conveniently manage enterprise-sized networks. Flexible and scalable - The components of ESET Mail Security can be installed
tech writer

ESET Endpoint Encryption Pro from 1 user, 1 Year - 0 views

  •  
    Simple and powerful encryption for businesses of all sizes Secure encryption of hard disks, removable media, files and email FIPS 140-2 validated 256-bit AES encryption for absolute security Hybrid, cloud-based management server for complete remote control of endpoint encryption keys and security policies Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT. How ESET encryption helps your business: Meet data security obligations by enforcing encryption policies without impacting productivity. Companies large and small benefit from low help desk costs and short deployment cycles. No other product comes close to ESET Endpoint Encryption in terms of flexibility or ease of use. The client side requires minimal user intervention and improves the compliance and security of our enterprise data from a single MSI package. The server side makes user and workstation management easy. It extends the protection of your business beyond the perimeter of your network.
tech writer

Validating Your Business Continuity Plan: Ensuring your BCP works | IT Governance UK - 0 views

  •  
    When a disruptive incident strikes, you need to know that your business continuity plan (BCP) will work smoothly and consistently. Many companies, however, fail to carry out any business continuity exercising. This book explains why validating your BCP is essential to your business's survival, and describes the component parts of a validation program, with case studies and expert guidance.
tech writer

Nuance Dragon Legal Group - 0 views

  •  
    With the Nuance Dragon Legal Group product, you have the option of replacing tedious typing with dictation in the future. Especially for companies with a lot of correspondence, this creates the necessary relief for more order in everyday business. Not only simple documents but also complex topics and content can be covered with Nuance Dragon Legal Group for every area. So you can create documents without having to sit down at the keyboard yourself. Nuance Dragon Legal Group makes it easier to reach important agreements and coordinate new actions across the entire firm. Thanks to speech recognition and continuous development in the deep-learning process, nothing stands in the way of excellent text recognition. Even the operation of speech recognition and the conversion of speech in the text already works intuitively and easily. With Nuance Dragon Legal Group, you, therefore, have the chance to work faster and save valuable time with each additional project step. Not only on the PC but also for mobile devices Nuance Dragon Legal Group has its strengths. Touch operation allows you to create important documents conveniently on the go. Thanks to personal interfaces, you always have access to the data you have already created and are up to date wherever you are. This feature is especially helpful for professionals such as web agencies, developers, lawyers, tax consultants, or external service providers.
tech writer

ISO 14001 2015 Standard | IT Governance UK - 0 views

  •  
    ISO 14001:2015 addresses the need for companies to factor in both external and internal elements that influence their impact, including climate volatility. ISO 14001 2015 - Environmental Management Systems - Requirements with guidance for use. The ISO 14001 standard specifies the requirements for an environmental management system (EMS). An EMS is a framework for organizations to control the environmental impacts of their activities, products, and services, and continually improve their environmental performance. It supersedes ISO 14001:2004.
tech writer

Microsoft SQL Server 2008 Standard R2 1 User CAL - 0 views

  •  
    User CAL: A user CAL entitles a specific user to use any number of devices, such as a company PC, private PC, mobile phone, etc., from which he or she may access the server software.
tech writer

Microsoft SQL Server 2012 Standard 1 User CAL - 0 views

  •  
    User CAL: A user CAL entitles a specific user to use any number of devices, such as company PC, private PC, mobile phone etc., from which he/she may access the server software.
tech writer

Microsoft Windows 11 Pro N for Workstation - 0 views

  •  
    The new Windows version convinces with many exciting features, with a new design and of course with a variety of versions. So it is worthwhile for companies to use Windows 11 Pro N for Workstation and to bring their own work to a new level. But in what specific aspects does this version differ from the classic Windows 11? We'll show you when Windows 11 Pro N for Workstation is worthwhile for you and what you need to look out for when buying it..
‹ Previous 21 - 40 of 71 Next › Last »
Showing 20 items per page