archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Services/solutions - Data Security Solutions
    an ideal solution to help you optimize the productivity and accessibility of your network without compromising your enterprise security Today most attacks come from inside your network bypassing the security provided by traditional firewalls and IPS systems manufacturers of applied products Identify and Access Windows Privilege Management to Mitigate Internal Threats to Systems On Premise and in the Cloud manufacturers of applied products Centrify Suite 2013 modules For deeper security and protection Centrify offers varios add on modules for Centrify Suite 2013 manufacturers of applied products Strong Authentication Tight security can be built on trusted cooperation so e signatures and authentification plays a grat role in this part of Data Security manufacturers of applied products WiFi Security With the increased demand for mobility and the rapid adoption of smart devices wireless networks are quickly becoming a critical component of network infrastructures across virtually every enterprise But as these networks evolve the cost and complexity of legacy controller based WLAN solutions are becoming increasingly cumbersome to manage and expensive to scale manufacturers of applied products Syslog Management In order to be succesfuly secured and protected information an knowledge is essential be informed by managing system logs and collecting info about what s happening in your companys business data network manufacturers of applied products Server Access Control At your company users at different organizational levels should have the possibility to directly access and manipulate sensitive information such as CRM data personnel records or credit card numbers Beyond these privileged users there are several superusers as well such as administrators IT contractors or executives who practically have unrestricted access to your information assets System logging has limitations in tracing what exactly happened in your applications moreover a skilled administrator or attacker can even manipulate logs to cover his tracks As a result it

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/3/en/pakalpojumi/network-security/identify-and-access/17/en/pakalpojumi/network-security/identify-and-access/17/en/pakalpojumi/network-security/identify-and-access/17/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    without compromising your enterprise security Today most attacks come from inside your network bypassing the security provided by traditional firewalls and IPS systems manufacturers of applied products Identify and Access Windows Privilege Management to Mitigate Internal Threats to Systems On Premise and in the Cloud manufacturers of applied products Centrify Suite 2013 modules For deeper security and protection Centrify offers varios add on modules for Centrify Suite 2013 manufacturers of applied products Strong Authentication Tight security can be built on trusted cooperation so e signatures and authentification plays a grat role in this part of Data Security manufacturers of applied products WiFi Security With the increased demand for mobility and the rapid adoption of smart devices wireless networks are quickly becoming a critical component of network infrastructures across virtually every enterprise But as these networks evolve the cost and complexity of legacy controller based WLAN solutions are becoming increasingly cumbersome to manage and expensive to scale manufacturers of applied products Syslog Management In order to be succesfuly secured and protected information an knowledge is essential be informed by managing system logs and collecting info about what s happening in your companys business data network manufacturers of applied products Server Access Control At your company users at different organizational levels should have the possibility to directly access and manipulate sensitive information such as CRM data personnel records or credit card numbers Beyond these privileged users there are several superusers as well such as administrators IT contractors or executives who practically have unrestricted access to your information assets System logging has limitations in tracing what exactly happened in your applications moreover a skilled administrator or attacker can even manipulate logs to cover his tracks As a result it is very difficult to answer the question of who did what and even more

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/3/en/pakalpojumi/network-security/identify-and-access/17/en/pakalpojumi/network-security/identify-and-access/17/en/pakalpojumi/network-security/centrify-suite-2013-modules/21/ (2013-11-15)
    Open archived version from archive

  • - -
    Balabit Catbird Cellcrypt Centrify Cyberoam ForeScout IBM Imprivata Infowatch Ipoque Lumension McAfee MobileIron PGP Prolexic Proofpoint Protected Networks Radware SecPoint Sourcefire SpectorSoft Symantec Varonis Vasco WhatsUp Gold Citadele Bank Read more In collaboration with system integrator Data Security Solutions we

    Original URL path: http://dss.lv/js/par-uznemumu/portfolio/?itm=4:uznemumi (2013-11-15)
    Open archived version from archive


  • - -
    Networks Avecto Balabit Catbird Cellcrypt Centrify Cyberoam ForeScout IBM Imprivata Infowatch Ipoque Lumension McAfee MobileIron PGP Prolexic Proofpoint Protected Networks Radware SecPoint Sourcefire SpectorSoft Symantec Varonis Vasco WhatsUp Gold ERGO Read more Increasing adoption of smart devices in the high tech workplace continues to drive the need for centralized advanced management end user self service and diversity of OS support from one solution Addressing the privacy posture or security state

    Original URL path: http://dss.lv/js/par-uznemumu/portfolio/?itm=1:uznemumi (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    Software authentication Mobile authentication SMS delivery Smart cards Where to use Remote access to internal networks via SSL VPN and browser based applications Intranets and extranets Web applications Webmail access IDENTIKEY Authentication Server Overview IDENTIKEY Authentication Server is VASCO s off the shelf centralized authentication server It is the perfect choice to secure remote access to corporate resources and various types of web based applications from remote access and SSL VPN to SaaS The solution is straightforward and scalable fit to accommodate the needs of both large and small implementations It offers complete functionality and management features without the need for significant budgetary or personnel investments This results in a fast and cost effective rollout IDENTIKEY Authentication Server supports Windows and Linux operating systems on 32 bits and 64 bits platforms Commercial offer Enterprise Security IDENTIKEY is available in 3 packaged versions for Enterprise Security use The Standard Edition includes RADIUS functionality for a single licensed server It targets SMBs wanting to secure their remote access infrastructure at the lowest TCO Total Cost of Ownership The Gold Edition offers several web filters to secure in house webapplications such as Outlook Web Access RDWebAccess Citrix Web Interface and Citrix Receiver additional to the RADIUS support It also offers a Plugin module for Steel Belt Radius SBR server This version includes licenses for a primary and a back up server It is an ideal solution for SMBs that want to offer more functionality and assure availability for their employees The Gold Edition also addresses the security needs of companies that want to protect the external access to the corporate network as well as Windows desktop and network logon The Enterprise Edition is the most comprehensive solution offering RADIUS for remote access to the corporate network Web filter support for access to in

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/strong-authentication/22/en/razotaji/vasco/27/en/razotaji/vasco/27/en/razotaji/vasco/27/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    all in one office suite enables users to securely create edit view and share Microsoft Office documents Mobile File Sharing Today s mobile workforce needs the ability to securely create view edit and access enterprise content from their mobile devices Accellion mobile file sharing provides secure creation viewing and sharing of enterprise content on popular smartphones and tablets while providing the IT administrative controls to manage user privileges and access rights necessary to ensure enterprise security The Accellion secure mobile file sharing solution integrates with popular MDM solutions including MobileIron Good Mocana and Symantec to enable secure mobile content management an essential component of an overall enterprise mobility strategy Key Features Securely browse create edit view edit send and share files on a mobile device Works with Word Excel PowerPoint PDF JPEG PNG just about any type of file Save files securely on a mobile device for offline use Upload files securely from the device to a secure workspace Share secure links to files or share folders with internal and external users Collaborate in real time by adding or replying to comments Lock and unlock files to control editing of files in Accellion workspaces and SharePoint Bulk upload and download of files Subscribe to notifications to learn who has added files or commented on files Log in using LDAP credentials Mobilize Enterprise Content With a rise in the number of data sources employees today need a unified view of enterprise content to be able to easily access and share business content on mobile devices Accellion provides secure real time mobile access to files stored in SharePoint Windows File Shares and other Enterprise Content Management ECM systems behind the corporate firewall without a VPN Users can easily and securely view edit upload and share files from tablets smartphones laptops or desktops with internal and external stakeholders without duplicating files into a new content system or exposing sensitive documents to a public cloud service Users get all the benefits of mobile file sharing while corporations can leverage and extend their investment in SharePoint Windows File Shares and other content sources ensuring content security and compliance practices can be enforced Key Features Mobilize Secure mobile access to SharePoint 2007 2010 and 2013 files Secure access to Windows File Shares using SMB V1 V2 and CIFS protocols Mobile access via iOS and Android apps Direct access to document of record content not replicated Secure round trip download edit upload files via Accellion Mobile Client iOS only Unify Disparate SharePoint sites and Windows File Shares displayed in single unified folder structure Single UI across ECM systems Accellion kitedrive and Accellion workspaces Similar UI across iOS Android and web interfaces Single login via Accellion app or browser provides secure access to ECM systems file stores Accellion collaboration and file sharing tools Collaborate Easily and securely share SharePoint files with external users No additional SharePoint Client Access Licenses CALs required Content encrypted in transit and at rest content expiration supported Additional collaboration features offered through Accellion workspaces

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/en/razotaji/accellion/33/en/razotaji/accellion/33/en/razotaji/accellion/33/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    approach is to simplify the problem for IT finance and end users by moving smartphone data to the enterprise cloud MobileIron MDM MAM Security MobileIron MDM add on modules Voice Call and SMS Encryption Secure Mobile File Sharing for Enterprise MobileIron MDM MAM Security Advanced Mobile Device Management MDM combines traditional mobile device management capabilities with comprehensive security and app capabilities powered by the MobileIron platform The administrator can manage the lifecycle of the device and its apps from registration to retirement and quickly get mobile operations under control manufacturers of applied products MobileIron MDM add on modules MobileIron featured add ons for better and specific policy development manufacturers of applied products Voice Call and SMS Encryption Protect your calls and SMS correspondece making data stream unavaiable to thirt persons by encypting it manufacturers of applied products Secure Mobile File Sharing for Enterprise Designed for the enterprise Accellion provides secure mobile file sharing capabilities for employees project teams internal external collaboration virtual data rooms and deal rooms manufacturers of applied products Customer feedback In collaboration with system integrator Data Security Solutions we looked at different vendors and compared them to each other Finally we selected VASCO for its best price

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/9/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-20