archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • - -
    30 04 2013 30 04 2013 30 04 2013 30 04 2013 30 04 2013 1 2 3 4 5 6 7 Twitter Tweets by DSS IT Security df

    Original URL path: http://dss.lv/js/par-drosibu/video/ (2013-11-15)
    Open archived version from archive


  • - -
    20 05 2013 20 05 2013 Twitter Tweets by DSS IT Security df

    Original URL path: http://dss.lv/js/par-drosibu/slideshare/ (2013-11-15)
    Open archived version from archive

  • - -
    C D E F G H I J K L M N O P Q R S T U V W X Y Z A Twitter Tweets by DSS IT

    Original URL path: http://dss.lv/js/par-drosibu/enciklopedija/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    network resources With the spread of remote access and an increasingly mobile workforce user authentication has become a key security concern Traditional static passwords alone are not enough to ensure only properly authenticated users can access sensitive information This common oversight may be the weakest link in your network s security VASCO s Two factor authentication solutions use one time password technology to secure user login and ensure only authenticated users gain access VASCO offers a complete range of authentication solutions including Hardware authenticators USB authenticators Software authentication Mobile authentication SMS delivery Smart cards Where to use Remote access to internal networks via SSL VPN and browser based applications Intranets and extranets Web applications Webmail access IDENTIKEY Authentication Server Overview IDENTIKEY Authentication Server is VASCO s off the shelf centralized authentication server It is the perfect choice to secure remote access to corporate resources and various types of web based applications from remote access and SSL VPN to SaaS The solution is straightforward and scalable fit to accommodate the needs of both large and small implementations It offers complete functionality and management features without the need for significant budgetary or personnel investments This results in a fast and cost effective rollout IDENTIKEY Authentication Server supports Windows and Linux operating systems on 32 bits and 64 bits platforms Commercial offer Enterprise Security IDENTIKEY is available in 3 packaged versions for Enterprise Security use The Standard Edition includes RADIUS functionality for a single licensed server It targets SMBs wanting to secure their remote access infrastructure at the lowest TCO Total Cost of Ownership The Gold Edition offers several web filters to secure in house webapplications such as Outlook Web Access RDWebAccess Citrix Web Interface and Citrix Receiver additional to the RADIUS support It also offers a Plugin module for Steel Belt Radius SBR server This version includes licenses for a primary and a back up server It is an ideal solution for SMBs that want to offer more functionality and assure availability for their employees The Gold Edition also addresses the security needs of companies that want to protect the external access to the corporate network as well as Windows desktop and network logon The Enterprise Edition is the most comprehensive solution offering RADIUS for remote access to the corporate network Web filter support for access to in house applications OWA RDWA CWI Receiver Plugin module for Steel Belt Radius SBR server SOAP for protection of Internet based business applications e g portals extranet e commerce websites partner services etc Licenses for up to seven servers RADIUS for remote access to the corporate network Licenses for up to seven servers It is the perfect solution for SMBs that want to secure more than remote access by using the same DIGIPASS device to secure additional applications at little to no extra cost It also addresses the need of large enterprises to set up a pool of replication servers to share the authentication load and assure high availability Especially when securing an increased number

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/strong-authentication/22/en/razotaji/vasco/27/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    controls secures and audits access to cross platform systems mobile devices and applications by leveraging an infrastructure you already own Active Directory Centrify Suite 2013 allows organizations to quickly and effectively meet compliance requirements and mitigate risks from internal threats while at the same time reducing operational costs The new features in Centrify Suite 2013 further empower enterprises to easily consolidate identities and secure privileged user access across UNIX Linux and Windows systems An integrated solution Centrify Suite 2013 consisting of DirectManage 5 1 DirectControl 5 1 DirectAuthorize 3 0 DirectAudit 3 0 and DirectSecure 1 3 enables secure authentication identity consolidation privileged access management and detaile d privileged user auditing across th e broadest set of platforms deployed on premise and in the cloud Centrify Suite 2013 builds on the core enhancements Centrify introduced in Suite 2012 by extending DirectAuthorize to Windows providing tighter integration between DirectAudit and DirectAuthorize and providing wizards and tools to make migration from Centrify classic Zo nes to hierarchical Zones incredibly easy In addition Centrify Suite 2013 introduces a collection of new features to make migration from legacy SUDO environments fast and simple All this makes Centrify Suite 2013 the industry s easiest and most scalable solution for unified identity and privilege management and detailed user auditing across UNIX Linux and Windows systems Centrify Delivers Windows Privilege Management to Mitigate Internal Threats to Systems On Premise and in the Cloud Centrify is pleased to announce Centrify Suite 2013 which offers a comprehensive approach to identity management that includes integrated authentication access control privilege management policy enforcement and compliance all based on a single unified architecture that leverages Microsoft Active Directory New in this Release DirectAuthorize for Windows To complement our existing solution for Linux and UNIX privilege management Centrify now introduces seamlessly integrated least

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/identify-and-access/17/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    management and delegate administration DirectAuthorize Role Based Privilege Management for Linux UNIX Strengthen security for Linux UNIX systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Linux UNIX but for Windows as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers DirectAuthorize for Windows Role Based Privilege Management for Windows Strengthen security for Windows systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Windows but for Linux UNIX as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers Net net DirectAuthorize for Windows is the perfect solution to restrict and protect both high privileged domain accounts as well as local accounts with administrative privilege DirectAudit Detailed Auditing of Privileged User Sessions on UNIX and Linux Systems DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis To learn more about DirectAudit DirectAudit for Window s Detailed Auditing of Privileged User Sessions on Windows DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With Centrify s award winning DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis DirectSecure Dynamically Segment and Isolate Cross Platform Systems Leverage your existing Active Directory infrastructure to secure access to sensitive information in mixed Windows UNIX and Linux environments Centrify DirectSecure is a policy based software solution that secures sensitive information by dynamically isolating and protecting cross platform systems and enabling optional end to end encryption of data in motion By

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/en/razotaji/centrify/7/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    management and delegate administration DirectAuthorize Role Based Privilege Management for Linux UNIX Strengthen security for Linux UNIX systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Linux UNIX but for Windows as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers DirectAuthorize for Windows Role Based Privilege Management for Windows Strengthen security for Windows systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Windows but for Linux UNIX as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers Net net DirectAuthorize for Windows is the perfect solution to restrict and protect both high privileged domain accounts as well as local accounts with administrative privilege DirectAudit Detailed Auditing of Privileged User Sessions on UNIX and Linux Systems DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis To learn more about DirectAudit DirectAudit for Window s Detailed Auditing of Privileged User Sessions on Windows DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With Centrify s award winning DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis DirectSecure Dynamically Segment and Isolate Cross Platform Systems Leverage your existing Active Directory infrastructure to secure access to sensitive information in mixed Windows UNIX and Linux environments Centrify DirectSecure is a policy based software solution that secures sensitive information by dynamically isolating and protecting cross platform systems and enabling optional end to end encryption of data in motion By

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/en/pakalpojumi/network-security/identify-and-access/17/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    having to move the data outside of Accellion s secure container Accellion s all in one office suite enables users to securely create edit view and share Microsoft Office documents Mobile File Sharing Today s mobile workforce needs the ability to securely create view edit and access enterprise content from their mobile devices Accellion mobile file sharing provides secure creation viewing and sharing of enterprise content on popular smartphones and tablets while providing the IT administrative controls to manage user privileges and access rights necessary to ensure enterprise security The Accellion secure mobile file sharing solution integrates with popular MDM solutions including MobileIron Good Mocana and Symantec to enable secure mobile content management an essential component of an overall enterprise mobility strategy Key Features Securely browse create edit view edit send and share files on a mobile device Works with Word Excel PowerPoint PDF JPEG PNG just about any type of file Save files securely on a mobile device for offline use Upload files securely from the device to a secure workspace Share secure links to files or share folders with internal and external users Collaborate in real time by adding or replying to comments Lock and unlock files to control editing of files in Accellion workspaces and SharePoint Bulk upload and download of files Subscribe to notifications to learn who has added files or commented on files Log in using LDAP credentials Mobilize Enterprise Content With a rise in the number of data sources employees today need a unified view of enterprise content to be able to easily access and share business content on mobile devices Accellion provides secure real time mobile access to files stored in SharePoint Windows File Shares and other Enterprise Content Management ECM systems behind the corporate firewall without a VPN Users can easily and securely view edit upload and share files from tablets smartphones laptops or desktops with internal and external stakeholders without duplicating files into a new content system or exposing sensitive documents to a public cloud service Users get all the benefits of mobile file sharing while corporations can leverage and extend their investment in SharePoint Windows File Shares and other content sources ensuring content security and compliance practices can be enforced Key Features Mobilize Secure mobile access to SharePoint 2007 2010 and 2013 files Secure access to Windows File Shares using SMB V1 V2 and CIFS protocols Mobile access via iOS and Android apps Direct access to document of record content not replicated Secure round trip download edit upload files via Accellion Mobile Client iOS only Unify Disparate SharePoint sites and Windows File Shares displayed in single unified folder structure Single UI across ECM systems Accellion kitedrive and Accellion workspaces Similar UI across iOS Android and web interfaces Single login via Accellion app or browser provides secure access to ECM systems file stores Accellion collaboration and file sharing tools Collaborate Easily and securely share SharePoint files with external users No additional SharePoint Client Access Licenses CALs required Content encrypted in transit

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/en/razotaji/accellion/33/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-21