archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Services/solutions - Data Security Solutions
    smartphone data to the enterprise cloud MobileIron MDM MAM Security MobileIron MDM add on modules Voice Call and SMS Encryption Secure Mobile File Sharing for Enterprise MobileIron MDM MAM Security Advanced Mobile Device Management MDM combines traditional mobile device management capabilities with comprehensive security and app capabilities powered by the MobileIron platform The administrator can manage the lifecycle of the device and its apps from registration to retirement and quickly get mobile operations under control manufacturers of applied products MobileIron MDM add on modules MobileIron featured add ons for better and specific policy development manufacturers of applied products Voice Call and SMS Encryption Protect your calls and SMS correspondece making data stream unavaiable to thirt persons by encypting it manufacturers of applied products Secure Mobile File Sharing for Enterprise Designed for the enterprise Accellion provides secure mobile file sharing capabilities for employees project teams internal external collaboration virtual data rooms and deal rooms manufacturers of applied products Customer feedback Increasing adoption of smart devices in the high tech workplace continues to drive the need for centralized advanced management end user self service and diversity of OS support from one solution Addressing the privacy posture or security state of smartphones and

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/9/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    and email encryption MDM and mobile security and much more With more than 1400 vendors in global IT Security market it is important to have ITSEC experienced and trusted advisor such as DSS Endpoint Management Suite Surveilance Monitoring Application Whitelisting Device Control Endpoint Management Suite Lumension Endpoint Management and Security Suite enables you to take control of your endpoints through an agile solution suite that simplifies systems management expands operational visibility and delivers more effective IT security all the while reducing complexity and endpoint TCO manufacturers of applied products Surveilance Monitoring Avoid insider jobs monitor your employee activity across Windows Mac and BlackBerry Devices Detect Insider Threats by watching at the source of these problems the employee manufacturers of applied products Application Whitelisting Lumension Intelligent Whitelisting is the industry s first application control whitelisting solution that increases endpoint security effectiveness without impacting business productivity manufacturers of applied products Device Control Centrally control and enforce security policies regarding use of removable devices e g USB flash drives and media e g DVDs CDs to prevent data loss and theft thwart malware intrusion and protect data via encryption manufacturers of applied products Customer feedback QRadar Security Intelligence Platform integrated in our infrastructure

    Original URL path: http://dss.lv/en/pakalpojumi/endpoint-security/2/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    access control is an ideal solution to help you optimize the productivity and accessibility of your network without compromising your enterprise security Today most attacks come from inside your network bypassing the security provided by traditional firewalls and IPS systems manufacturers of applied products Identify and Access Windows Privilege Management to Mitigate Internal Threats to Systems On Premise and in the Cloud manufacturers of applied products Centrify Suite 2013 modules For deeper security and protection Centrify offers varios add on modules for Centrify Suite 2013 manufacturers of applied products Strong Authentication Tight security can be built on trusted cooperation so e signatures and authentification plays a grat role in this part of Data Security manufacturers of applied products WiFi Security With the increased demand for mobility and the rapid adoption of smart devices wireless networks are quickly becoming a critical component of network infrastructures across virtually every enterprise But as these networks evolve the cost and complexity of legacy controller based WLAN solutions are becoming increasingly cumbersome to manage and expensive to scale manufacturers of applied products Syslog Management In order to be succesfuly secured and protected information an knowledge is essential be informed by managing system logs and collecting info about what s happening in your companys business data network manufacturers of applied products Server Access Control At your company users at different organizational levels should have the possibility to directly access and manipulate sensitive information such as CRM data personnel records or credit card numbers Beyond these privileged users there are several superusers as well such as administrators IT contractors or executives who practically have unrestricted access to your information assets System logging has limitations in tracing what exactly happened in your applications moreover a skilled administrator or attacker can even manipulate logs to cover his tracks As

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/3/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    are the most common frameworks in use IT security governance is the system by which an organization directs and controls IT security adapted from ISO 38500 IT security governance should not be confused with IT security management IT security management is concerned with making decisions to mitigate risks governance determines who is authorized to make decisions DSS offers best of breed technology tools to automatize the ISG SIEM based Risk Management Risk Compliance Mangement SIEM based Risk Management QRadar Risk Manager provides organizations with a pre exploit solution that allows network security professionals to assess what risks exist during and after an attack while also answering many What if questions ahead of time which can greatly improve operational efficiency and reduce network security risks manufacturers of applied products Risk Compliance Mangement Governance risk management and compliance or GRC is the umbrella term covering an organization s approach across these three areas Being closely related concerns governance risk and compliance activities are increasingly being integrated and aligned to some extent in order to avoid conflicts wasteful overlaps and gaps manufacturers of applied products Customer feedback QRadar Security Intelligence Platform integrated in our infrastructure by Data Security Solutions became the cornerstone of

    Original URL path: http://dss.lv/en/pakalpojumi/security-management/6/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    data at rest data in use and data in motion HDD files databases email structured unstructured etc Encryprtion platform Email encryption Whole Disk Encription File Share Encryption Backup and mainframe encryption Encryprtion platform Protection for laptops desktops endpoints email mobile and data in the cloud Implement multiple encryption solutions to create a more complete security solution and better handle compliance regulations manufacturers of applied products Email encryption Gateway Email Encryption provides centrally managed email encryption to secure email communications with customers and partners With Gateway Email Encryption organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy manufacturers of applied products Whole Disk Encription If you re using a computer or a removable USB drive chances are that you have sensitive data on these devices Whether it s a home computer with family finances a work computer with sensitive corporate information or a thumb drive with government secrets you need to ensure that there is no unauthorized access to that data shouldthe devicebe lost or stolen Drive encryption also known as disk encryption protects this data rendering it unreadable to unauthorized users This paper describes the differences between drive and file encryption details how drive encryption works and addresses recovery mechanisms manufacturers of applied products File Share Encryption File Share Encryption allows users to automatically and transparently encrypt individual files and folders on laptops desktops and file servers enabling secure sharing of protected documents spreadsheets graphics files and more manufacturers of applied products Backup and mainframe encryption Applications transferring managing and archiving critical information are the foundation of corporate information systems Security breaches and the resulting consequences have made organizations aware of the many ways sensitive corporate information and customer data can be compromised For IT managers architects and

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/4/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    Security Security in cloud Catbird vSecurity enables a secure and compliant virtual and private cloud infrastructure vSecurity ensures IT can meet the full complement of auditor required network security controls with a set of features that encompass the seven requirements common to all compliance standards manufacturers of applied products Virtualization Security Virtualization is transforming the data center and the virtualization of security is happening right alongside it manufacturers of applied

    Original URL path: http://dss.lv/en/pakalpojumi/cloud-computing/5/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    time network and application attack mitigation solution that protects the application infrastructure against network application downtime application vulnerability exploitation malware spread information theft web service attacks and web defacement Official webpage Protect Application Infrastructure Against Known and Emerging Application and Network Threats in Real Time Data center and network security managers face an increasing threat landscape including network downtime application downtime application vulnerability information theft authentication defeat malware spread web application attacks and web defacement In order to combat the increasing threat landscape security managers are required to deploy multiple detection and protection tools including Intrusion Prevention Systems IPS DoS Protection Network Behavioral Analysis NBA IP reputation tools and Web Application Firewall WAF Recent attacks in 2010 and 2011 such as the WikiLeaks cyber retaliation attacks have left many organizations vulnerable to emerging multi vulnerability attacks Additionally zero minute malware spread attacks Trojan installs and botnet based attacks are not prevented by standard IPS deployments Radware s Attack Mitigation System contains 5 key components DoS protection Rapidly and precisely distinguish between three types of Denial of Service DoS behavior legitimate normal traffic attack traffic and unusual patterns created by legitimate activity This module includes a feature that quickly mitigates zero day DoS DDoS attacks and another which protects against common DoS DDoS floods Intrusion Prevention Provide maximum protection for your network elements hosts and applications This module helps prevent intrusion attempts such as worms Trojan horses malware and single bullet attacks facilitating complete and high speed cleansing of all malicious intrusions PCI Compliance Avoid penalties and facilitate cost effective compliance with an integrated solution set for access control data privacy auditing logging security and more SSL Based Attack Protection Complete DDos mitigation solution for online businesses using cryptographic protocols such as TLS or SSL to encrypt transactions and ensure secured

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/attack-mitigation-system/11/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    cybercriminals DSS provides information security services to help companies of all sizes protect their IT security assets MobileIron MDM MAM Security MobileIron MDM add on modules Voice Call and SMS Encryption Secure Mobile File Sharing for Enterprise MobileIron MDM MAM Security Advanced Mobile Device Management combines traditional mobile device management capabilities with comprehensive security and app capabilities powered by the MobileIron platform The administrator can manage the lifecycle of the device and its apps from registration to retirement and quickly get mobile operations under control Official webpage The MobileIron Mobile IT platform focuses on securing and managing apps docs and devices for global organizations It supports both corporate liable and individual liable devices offering true multi OS management across the leading mobile OS platforms MobileIron features Multi OS Device Management Central web based console across operating systems Inventory and asset management Device configuration Encryption policy phone SD Lockdown security camera SD Bluetooth Wi Fi Password enforcement Remote lock and wipe End user self service App Management Inventory Private app storefront Rogue app protection Real World Scale 100 000 devices per server Central console for horizontal scale up to 500 000 devices Complex configurations with secure check in intervals of less than 4 hours Simultaneous registration of hundreds of devices 3 000 concurrent app downloads Rigorous test automation through MobileIron TRUST T est for R eliability U nder ST ress Enterprise Data Boundary Selective wipe Privacy policy Access Control Sentry ActiveSync connection activity and device visibility Blocking of email access Advanced Security Certificate distribution Posture detection Real Time Roaming Notification Alert when roaming internationally Lost Phone Recovery Locate and map Administration Over the air provisioning Role based access Group based actions Broadcast SMS APNs C2DM Persistent logs and audit trails Enterprise Integration Web Services API BES and ActiveSync integration Directory services

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/advanced-mdm/7/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-19