Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items matching "standards" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
tech writer

Microsoft Windows Remote Desktop Services 2022, User CAL, RDS CAL, Client Access License - 0 views

  •  
    If you want to access Windows Server 2022 from the outside, you need a so-called Remote Desktop Service CAL, which is abbreviated as RDS CAL. This is a fixed part of the Microsoft licensing model that allows external access. With a Remote Desktop 2022 User CAL, it is possible to access the Win Server Standard 16/24 Core or the Win Server 2022 Datacenter 16/24. As with the Win Server 2022 Standard User CAL, access is bound to a user, not to the device used. This makes it best suited for users who regularly work on a specific endpoint device and thus need to access the server directly or indirectly.
tech writer

ISO9001 (ISO 9001) Quality Management Systems (QMS) Requirements - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard in order to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organisation: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework, and is currently used by more than a million organisations worldwide. It sets the standard not only for quality management systems, but management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

ISO 14001 2015 Standard | IT Governance UK - 0 views

  •  
    ISO 14001:2015 addresses the need for companies to factor in both external and internal elements that influence their impact, including climate volatility. ISO 14001 2015 - Environmental Management Systems - Requirements with guidance for use. The ISO 14001 standard specifies the requirements for an environmental management system (EMS). An EMS is a framework for organizations to control the environmental impacts of their activities, products, and services, and continually improve their environmental performance. It supersedes ISO 14001:2004.
tech writer

Microsoft Exchange Server 2013 Standard, 1 User CAL - 0 views

  •  
    Exchange requires a CAL for each user or device accessing the server software. There are two CAL variants here : Standard CAL: Enables any user to work productively across virtually any platform, browser, and mobile device.
tech writer

Norton 360 Standard, 10 GB cloud backup, 1 device 1 year NO SUBSCRIPTION - 0 views

  •  
    The NEW Norton 360 combines multiple layers of protection in a single solution. In addition to protecting your devices against viruses, phishing, and other online threats, you get Secure VPN, which helps you secure your data on the wireless network with highly secure encryption, a password manager to generate and store passwords and logins, Cloud Backup for your PC to prevent data loss due to hard drive failures and ransomware, and Safecam for your PC to block unauthorized access to your webcam. In today's networked world, you need more than just virus protection.
tech writer

TurboCAD 2020 Designer, English | IMSI Design - 0 views

  •  
    TurboCAD 2020 Designer - Easy 2D CAD Software: Complete 2D Drafting & Detailing including hundreds of drawing, modifying, dimensioning, and annotation tools Easy, handle-based editing, snaps, drawing aids, and new centerline and center mark tools speed design. Design Director for object property management. Simple File Sharing with AutoCAD®2019 .DWG & .DXF, SketchUp .SKP, save to PDF and more! NEW! Repeat Last Command. NEW! Block and Group Editing Mode indicator bar. TurboCAD Designer 2020 is the best precision design solution on the market for new CAD users. It's easy to learn and use with quick access to hundreds of 2D drawing, modifying, and dimensioning tools that are perfect for designing floor plans, technical illustrations, flow charts, and more. You can even share your work in over 20 industry standard CAD & graphic file formats including the latest AutoCAD®2020 DWG/DXF formats. A lot of new and improved features have been added in 2020.
tech writer

ESET PROTECT Essential - 0 views

  •  
    ESET PROTECT Essentials (ehemals Endpoint Protection Standard Cloud) umfasst Virenschutz für Endgeräte, Dateien, virtuelle Umgebungen und mobile Benutzer über die ESET PROTECT Cloud. Preisgekrönten Virenschutz für Ihr Unternehmen bei Blitzhandel24 kaufen. Cloud-based Console. Endpoint Antivirus. Schützen Sie die Computer, Laptops und Mobiltelefone Ihres Unternehmens mit modernsten Sicherheitsprodukten, die alle über eine Cloud-basierte Management-Konsole verwaltet werden. Die leicht zugängliche ESET PROTECT Cloud-Konsole verbessert die TCO des Sicherheitsmanagement. Einsicht in Bedrohungen, Benutzer und unter Quarantäne gestellte Objekte über eine zentrale Fernverwaltung und unter Quarantäne gestellte Objekte. Schutz von Unternehmensendpunkten und mobilen Geräten durch fortschrittliche mehrschichtige Technologie, einschließlich Dateiserver-Sicherheit, jetzt mit sicherem Intranet- und Banking-Schutz. Erstklassiger Endpunkt-Virenschutz, der den verifizierten mehrschichtigen Ansatz von ESET nutzt Ansatz (der das Beste aus allen Welten kombiniert: Cloud-basierte Reputation, maschinelles Lernen und Deep Behavioral Inspection). Der preisgekrönte Endpunktschutz kombiniert die neuesten Machine Lerntechniken mit jahrzehntelanger menschlicher Expertise
tech writer

Cyber Security Risk Management Training | Security Risk Assessment | Learning Tree - 0 views

  •  
    Cyber Security Risk Management Training | Security Risk Assessment | Learning Tree - Learn to protect your organization by employing a standards-based risk management process in this cyber security risk assessment & management course.
tech writer

HTML5, CSS3 and JavaScript Training: Platform-Independent Web Development | Learning Tree - 0 views

  •  
    HTML5, CSS3, and JavaScript Training: Platform-Independent Web Development | Learning Tree - This HTML5, CSS3 & JavaScript course will teach you to enhance the User Experience (UX) & build modern, feature-rich web pages with the latest standards.
tech writer

Official ISACA COBIT® 5 Enabling Information Guide | IT Governance UK - 0 views

  •  
    Perfect introduction to the principles and practice of the governance of enterprise IT using COBIT®5. Written by an experienced COBIT® trainer and practitioner, Geoff Harmer provides advice that is easy to follow and apply. This book includes: A practical introduction to the key concepts of COBIT® 5, ideal for anyone involved in an implementation project, or studying for the COBIT® 5 Foundation exam. The main frameworks and standards supporting the governance of enterprise IT (GEIT), putting the benefits of COBIT® 5 into context. [COBIT, GEIT, Enterprise IT, IT Governance, Governance Framework, COBIT5, COBIT 5,]
tech writer

Nine Steps to Success: An ISO 27001 Implementation Overview | IT Governance UK - 0 views

  •  
    The essential guide for anyone about to embark on an ISO 27001 implementation project, covering every step of the process from management buy-in to certification. A must-have guide from ISO 27001 expert Alan Calder to help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success: Details the key steps of an ISO 27001 project from inception to certification. Explains each element of the ISO 27001 project in simple, non-technical language. An ideal guide for anyone tackling ISO 27001 implementation for the first time.
tech writer

NIS Regulations - A Pocket Guide for Digital Service Providers | IT Governance UK - 0 views

  •  
    Gain a clear understanding of the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: Which DSPs (digital service providers) are within scope; The key requirements; and How guidance from international standards can assist with compliance.
tech writer

ISO 27001 ISMS & ISO 27701 PIMS Lead Implementer Course | IT Governance UK - 0 views

  •  
    Certified ISO 27001 ISMS and ISO 27701 PIMS Lead Implementer Combination Training Course: Learn how to lead and implement an ISO 27001 ISMS (information security management system) and ISO 27701 PIMS (privacy information management system) project. Acquire the skills to lead and manage an ISO 27001-compliant ISMS (information security management system) implementation project. Extend your knowledge to ensure full compliance with the ISO 27701 standard for a PIMS (privacy information management system). Significantly enhance your career prospects as an ISO 27001 implementer. Learn from anywhere. Choose the Classroom course or the Live Online option to study your way and keep travel and costs down to a minimum. Find out more. Successful completion of the courses and included exams leads to the IBITGQ Certified ISO 27001 ISMS Lead Implementer (CIS LI) and Certified ISO 27701 PIMS Lead Implementer (PI LI) qualifications.
tech writer

Complete Staff Awareness E-learning Suite | IT Governance UK - 0 views

  •  
    IT Governance's complete staff awareness e-learning suite is a cost-effective way of organizing all of your staff awareness training under one, manageable contract. Access all 11 of our staff awareness e-learning programs and two challenge games to train staff on best practice processes. Ensure staff can spot and respond to cyber security and privacy risks. Comply with data protection and information security legislation and standards. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts our programs are updated every three months to ensure the content remains relevant. Gain access to any new content we release throughout your year-long contract. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all of the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

ISO 22301:2019 and business continuity management | IT Governance UK - 0 views

  •  
    ISO 22301:2019 and business continuity management walk you through the requirements of ISO 22301:2019, explaining what they mean and how your organization can achieve compliance. Practical guidance for developing and implementing a BCMS (business continuity management system) based on the international standard ISO 22301. Written for managers rather than experts, making it an ideal introduction for non-specialists. Essential reading for all managers, executives, and directors with any interest or involvement in operational risk or business continuity management.
tech writer

BS 10012 2017 + A1 2018 Standard | IT Governance UK - 0 views

  •  
    Buy BS10012:2017 specification for a personal information management system (PIMS) updated to comply with the GDPR. Available as a PDF download or hardcopy. BS 10012 2017 +A1 2018 - Data protection - Specification for a personal information management system (PIMS) BS 10012:2017+A1:2018 specifies the framework for implementing a personal information management system (PIMS) in compliance with the General Data Protection Regulation (GDPR). This new version is an update to the 2009 edition of BS 10012:2017, which was specific to the 1998 Data Protection Act. The A1 2018 amendment takes in further small changes as a result of the UK Data Protection Act 2018.
tech writer

BS 10012 Internal Audit Service | IT Governance UK - 0 views

  •  
    Save time and effort by outsourcing your BS 10012 internal audit | IT Governance: Save time and effort by outsourcing your BS 10012 internal audit to an experienced consultant and get peace of mind that the personal information you hold is managed effectively and securely. Comprising one audit of two days' duration led by a qualified consultant with in-depth understanding and experience of the Standard, IT Governance's BS 10012 internal audit service will ensure that your client and stakeholder requirements for personal information management are met.
tech writer

BS 10012 Gap Analysis Service | IT Governance UK - 0 views

  •  
    Receive expert insight into your compliance gaps against the personal information management standard, BS 10012, with IT Governance's gap analysis service. IT Governance's BS 10012 Gap Analysis Service enables you to: Get the true picture of your BS 10012 compliance gaps; Receive expert advice on how to scope your project; Establish your project resource requirements; and Know exactly what needs to be done to become BS 10012 compliant.
tech writer

Certified ISO 22301 BCMS Lead Auditor Training Course | IT Governance UK - 0 views

  •  
    The ISO22301 Certified BCMS Lead Auditor training course provides delegates with the practical knowledge and skills required to plan and execute audits of Business Continuity Management Systems in line with the requirements specified by the ISO 22301:2012 standard. Learn from specialist consultants and gain the practical knowledge and skills required to plan and execute audits of a business continuity management system (BCMS) Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Our Classroom / Live Online option allows you to study your way, keeping travel and costs down to a minimum. IBITGQ and CIISec (The Chartered Institute of Information Security) accredited five-day training course. Successful completion of the course and included exam leads to the ISO 22301 Certified BCMS Lead Auditor (CBC LA) qualification and 35 CPD/CPE points.
« First ‹ Previous 41 - 60 of 114 Next › Last »
Showing 20 items per page