archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Video - Security Portal - Data Security Solutions
    based GRC DSS Enterprise MDM MAM Mobile Security MobileIron Overview 2013 IT security history Security news Video Slideshare presentations Threat encyclopedia 08 04 2013 How Security Intelligence Can Help Protect Enterprises Industry news Twitter Tweets by DSS IT Security Newest from Slideshare DSS Enterprise MDM MAM Mobile Security MobileIron Overview 2013 Did you know In May 30 2013 will be presented 8MAN s new 5 0 release Learn more About

    Original URL path: http://dss.lv/en/par-drosibu/video/how-security-intelligence-can-help-protect-enterprises/5/ (2013-11-15)
    Open archived version from archive


  • - -
    smartphones and tablets with MobileIron helps us to manage risks related to overall mobility trends Citadele Bank Guntars Andersons CIO Primary drivers for purchasing QRadar SIEM Security Intelligence were increasing security personnel e ciency reducing incident response times avoiding security threats and managing compliance RSA Baltics Gerirdas Verikas Information Security Manager QRadar Security Intelligence Platform integrated in our infrastructure by Data Security Solutions became the cornerstone of our security strategy

    Original URL path: http://dss.lv/js/par-uznemumu/atsauksmes/ (2013-11-15)
    Open archived version from archive

  • - -
    Networks Avecto Balabit Catbird Cellcrypt Centrify Cyberoam ForeScout IBM Imprivata Infowatch Ipoque Lumension McAfee MobileIron PGP Prolexic Proofpoint Protected Networks Radware SecPoint Sourcefire SpectorSoft Symantec Varonis Vasco WhatsUp Gold Citadele Bank Read more Increasing adoption of smart devices in the high tech workplace continues to drive the need for centralized advanced management end user self service and diversity of OS support from one solution Addressing the privacy posture or security

    Original URL path: http://dss.lv/js/par-uznemumu/portfolio/2/ (2013-11-15)
    Open archived version from archive


  • - -
    30 04 2013 08 04 2013 1 2 3 4 5 6 7 Twitter Tweets by DSS IT Security df

    Original URL path: http://dss.lv/js/par-drosibu/video/?p=7 (2013-11-15)
    Open archived version from archive

  • - -
    B C D E F G H I J K L M N O P Q R S T U V W X Y Z Twitter Tweets by DSS IT

    Original URL path: http://dss.lv/js/par-drosibu/enciklopedija/+/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    Software authentication Mobile authentication SMS delivery Smart cards Where to use Remote access to internal networks via SSL VPN and browser based applications Intranets and extranets Web applications Webmail access IDENTIKEY Authentication Server Overview IDENTIKEY Authentication Server is VASCO s off the shelf centralized authentication server It is the perfect choice to secure remote access to corporate resources and various types of web based applications from remote access and SSL VPN to SaaS The solution is straightforward and scalable fit to accommodate the needs of both large and small implementations It offers complete functionality and management features without the need for significant budgetary or personnel investments This results in a fast and cost effective rollout IDENTIKEY Authentication Server supports Windows and Linux operating systems on 32 bits and 64 bits platforms Commercial offer Enterprise Security IDENTIKEY is available in 3 packaged versions for Enterprise Security use The Standard Edition includes RADIUS functionality for a single licensed server It targets SMBs wanting to secure their remote access infrastructure at the lowest TCO Total Cost of Ownership The Gold Edition offers several web filters to secure in house webapplications such as Outlook Web Access RDWebAccess Citrix Web Interface and Citrix Receiver additional to the RADIUS support It also offers a Plugin module for Steel Belt Radius SBR server This version includes licenses for a primary and a back up server It is an ideal solution for SMBs that want to offer more functionality and assure availability for their employees The Gold Edition also addresses the security needs of companies that want to protect the external access to the corporate network as well as Windows desktop and network logon The Enterprise Edition is the most comprehensive solution offering RADIUS for remote access to the corporate network Web filter support for access to in

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/strong-authentication/22/en/razotaji/vasco/27/en/razotaji/vasco/27/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    identity from access management and delegate administration DirectAuthorize Role Based Privilege Management for Linux UNIX Strengthen security for Linux UNIX systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Linux UNIX but for Windows as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers DirectAuthorize for Windows Role Based Privilege Management for Windows Strengthen security for Windows systems applications and services through delegated administration separation of duties and granular access control Centrify DirectAuthorize is a multi platform solution that eliminates the problem of too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions With a single console and deployment architecture not only for Windows but for Linux UNIX as well DirectAuthorize gives organizations global control and visibility over privileges and enables user level auditing across all of their on premise and cloud based servers Net net DirectAuthorize for Windows is the perfect solution to restrict and protect both high privileged domain accounts as well as local accounts with administrative privilege DirectAudit Detailed Auditing of Privileged User Sessions on UNIX and Linux Systems DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis To learn more about DirectAudit DirectAudit for Window s Detailed Auditing of Privileged User Sessions on Windows DirectAudit combines unique session auditing and replay features along with comprehensive searching capability and real time monitoring Centrify DirectAudit s detailed capture of historical user activity establishes accountability and advances compliance reporting by recording which users accessed which systems what commands they executed with what privilege and the exact changes they made to key files and configurations With Centrify s award winning DirectAudit enterprises can report on historical user activity pinpoint suspicious activity through real time monitoring and troubleshoot system failures by replaying actions for root cause analysis DirectSecure Dynamically Segment and Isolate Cross Platform Systems Leverage your existing Active Directory infrastructure to secure access to sensitive information in mixed Windows UNIX and Linux environments Centrify DirectSecure is a policy based software solution that secures sensitive information by dynamically isolating and protecting cross platform systems and enabling optional end to end encryption of data

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/en/razotaji/centrify/7/en/pakalpojumi/network-security/identify-and-access/17/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    rapidly deploy its services to protect your business from any type of DDoS attack Our in the cloud DDoS protection service platform enables any company doing business online to easily access our services without purchasing equipment or employing or training specialized staff Prolexic s DDoS protection solutions are carrier neutral and can protect all of your traffic and global applications Prolexic s services are all backed by an industry leading service level agreement SLA DDoS mitigation and protection services Prolexic s DDoS mitigation and protection goes beyond network appliances and intrusion detection to prevent network traffic from being interrupted by distributed denial of service DDoS attacks With our DDoS mitigation services you can avoid DDoS attacks and downtime due to malicious hackers Our DDoS mitigation services stop and prevent DDoS attacks DDoS attacks are getting bigger and more complex With limited bandwidth and sophistication other DDoS mitigation service providers can no longer mitigate or prevent today s multi vector DoS and DDoS attacks Prolexic s DDoS mitigation services are different they have more capacity they are implemented in minutes and stop all attacks They even discourage DDoS attacks DDoS attackers who see traffic has been rerouted through our DDoS mitigation network will often immediately abandon their attacks They know they are no match for our live expert DDoS mitigation personnel Putting DDoS protection in place is not enough Under attack situations you need to have the right DDoS protection to ensure your website and mission critical network infrastructure remains available at all times Dedicated DDoS mitigation network for the best DDoS protection Prolexic has a dedicated DDoS mitigation network well in excess of 800 Gbps DDoS mitigation for every application layer including Layer 3 4 and 7 Proven solutions against encrypted attacks that vandalize HTTPS traffic in real time Certified

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/ddos-protection-as-a-service/45/en/pakalpojumi/network-security/ddos-protection-as-a-service/45/en/pakalpojumi/network-security/ddos-protection-as-a-service/45/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-20