archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Threat encyclopedia - Security Portal - Data Security Solutions
    Overview 2013 IT security history Security news Video Slideshare presentations Threat encyclopedia Threat encyclopedia A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Industry news Twitter Tweets by DSS IT Security Newest from Slideshare DSS Enterprise MDM MAM Mobile Security MobileIron Overview 2013 Did you know In May 30 2013 will be

    Original URL path: http://dss.lv/en/par-drosibu/enciklopedija/ (2013-11-15)
    Open archived version from archive


  • -
    Twitter Tweets by DSS IT Security df

    Original URL path: http://dss.lv/js/marq/fade-trends2.png/ (2013-11-15)
    Open archived version from archive

  • Testemonials - About company - Data Security Solutions
    helps us to manage risks related to overall mobility trends Citadele Bank Guntars Andersons CIO Primary drivers for purchasing QRadar SIEM Security Intelligence were increasing security personnel e ciency reducing incident response times avoiding security threats and managing compliance RSA Baltics Gerirdas Verikas Information Security Manager QRadar Security Intelligence Platform integrated in our infrastructure by Data Security Solutions became the cornerstone of our security strategy AB LV Bank Aleksejs Kudrjašovs CSO In collaboration with system integrator Data Security Solutions we looked at different vendors and compared them to each other Finally we selected VASCO for its best price performance ratio ERGO Dainis Bairs Newest success story ERGO Group is one of the major insurance groups in Europe The company offers a range of insurance provision and services to a 40 million customer base In Latvia the company is represented by two of its subsidiaries ERGO Latvia and ERGO Life Insurance SE The first one focuses on property and casualty insurance the latter on health and life insurance Although the two companies have different purposes and partners they are part of one and the same enterprise ERGO s salespeople collect their data in an internal system that ought to be accessible

    Original URL path: http://dss.lv/en/par-uznemumu/atsauksmes/ (2013-11-15)
    Open archived version from archive


  • AirTight Networks - Data Security Solutions
    of smart devices wireless networks are quickly becoming a critical component of network infrastructures across virtually every enterprise But as these networks evolve the cost and complexity of legacy controller based WLAN solutions are becoming increasingly cumbersome to manage and expensive to scale AirTight Wi Fi provides high performance wireless networking that scales to meet the demands of any enterprise AirTight s next generation controllerless Wi Fi architecture eliminates the

    Original URL path: http://dss.lv/en/razotaji/airtight-networks/1/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    networks Network administrators can monitor and managed all Wi Fi networks including those in remote officer from a centralized console High performance 802 11n Wi Fi for bandwidth intensive applications Quality of service controls give priority to critical mobile applications BYOD device on boarding for employee smart devices Embedded WIPS minimized network disruptions and protect corporate data Centralized administration to manage both campus and remote offices Enterprise Grade Wireless LAN At no additional licensing costs AirTight Wi Fi provides all the enterprise WLAN features including content filtering firewall QoS admission control traffic shaping and BYOD device onboarding AirTight has a family of custom engineered software configurable Wi Fi APs including its C60 platform that is dual radio dual concurrent and industry s only that can deliver 3x3 3 performance on 802 3af power budget and can also provide dedicated 24 7 WIPS protection concurrent with 802 11n access Key Features Dual radio 802 11n 3x3 3 access on 802 3af PoE WPA and WPA2 with PSK and 802 1x authentication Support for multiple BSSIDs and VLANs per AP Support for NAT or bridging operation per SSID Guest Wi Fi access with customizable captive portal and walled garden Content filtering and built in firewall Traffic shaping for managing bandwidth allocation per SSID QoS for real time and mission critical applications Secure BYOD device fingerprinting and onboarding Industry s Only Location Aware Centralized Management AirTight s patented hierarchical location based policy management architecture simplifies management of geographically distributed locations easily scaling from ten to tens of thousands of locations Using this architecture enterprises can define role based administration such that administrators get access to only the locations and functions they manage other locations and functions are out of bounds and naturally protected from mismanagement Other functions including inheritance and customization of policies dashboards devices and alerts listing statistics and reporting are also location aware Key Features Single console to manage unlimited number of geographically distributed sites Intuitive HTML5 GUI with customizable dashboards Hierarchical location based policy inheritance and customization Role based administration No need for extensive product training or certifications World s Best Wireless Intrusion Prevention AirTight s top ranked wireless intrusion prevention system WIPS is built into AirTight Wi Fi Depending on their security requirements enterprises can choose to deploy AirTight Wi Fi with background scanning or with concurrent full time WIPS for 24 7 dedicated protection from all types of wireless threats Enterprises have the flexibility to toggle between modes centrally on any number of devices in one go and have a mix of devices with different modes at the same time Key Features Wireless monitoring across 2 4 GHz and 5 GHz frequency bands Patented Marker PacketTM technology for accurate Rogue detection 24 7 monitoring of up to 100 VLANs for Rogues Most comprehensive protection from all types wireless threats including Rogue APs Soft Rogue APs Ad hoc connections Client misassociations Honeypots Wi Fi DoS attacks and Mobile Hotspots Reliable over the air and on wire threat prevention in

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/wifi-security/36/ (2013-11-15)
    Open archived version from archive

  • BalaBit - Data Security Solutions
    innovations to local pan Baltic market BalaBit Providing Network security BalaBit is a fast growing technology focused company committed to satisfying market needs through constant innovation of its core technologies and products For us quality means meeting the requirements of our customers as well as the standards of our engineers Our customers form a community where they share their knowledge experiences and opinions with each other join product roadmap discussions and participate in creating values together As an active member of the open source community we provide solutions to a uniquely wide range of both open source and proprietary platforms even for the most complex and heterogeneous IT systems across physical virtual and cloud environments BalaBit is also known as the logging company based on the company s flagship product the open source log server application which is used by more than 850 000 companies worldwide and became the globally acknowledged de facto industry standard BalaBit the fastest growing IT Security company in the Central European region according to Deloitte Technology Fast 50 2012 list has local offices in France Germany Russia and in the USA and cooperates with partners worldwide Our R D and global support centers are located

    Original URL path: http://dss.lv/en/razotaji/balabit/5/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    your organization is subject to internal e g COBIT or external regulations e g PCI DSS or ISO2700x and has to audit its IT infrastructure syslog ng PE helps you to secure your logging infrastructure by storing the log messages in signed encrypted and timestamped log files Building your logging infrastructure on syslog ng PE will enable you passing compliance audits easily and simplify localizing evidence in forensics situations as well Improving SIEM operation You can significantly improve the reliability of your Security Information and Event Management SIEM solution with only a small extra cost if you connect your existing system with syslog ng PE It is the best tool to optimize preprocessing and to get the best TCO out of your SIEM installation The syslog ng application is fully compatible with all widespread log analyzer and SIEM solutions Upgrading from Open Source Edition Infrastructures based on syslog ng Open Source Edition OSE are increasingly becoming corporate value Comparing to OSE version syslog ng PE is a regularly maintained and quality assured solution resulting in less operational risk for IT managers Syslog ng PE is perfectly compatible with the OSE version so upgrading is simple and effortless If you want to see the cost benefits of syslog ng PE over syslog ng OSE please try our ROI calculator Client side The syslog ng PE application is the best solution to collect log messages from heterogeneous environments via a secure reliable infrastructure and comply with external or internal regulations like SOX PCI DSS HIPAA ISO27000 or COBIT Learn more Server side The syslog ng PE application is a high performance log server with flexible filtering capabilities and advanced storage services Learn more Pattern DB BalaBit s revolutionary log identification and classification engine provides you high performance message pre processing Learn more Windows Event Log With the syslog ng Windows Agent you are able to collect Windows Event Logs to your existing syslog server Learn more IBM System i The syslog ng is the only UNIX Linux logging product that is able to integrate IBM System i journals into the central logging infrastructure The syslog ng Agent for IBM System i is available as a standalone product and is priced and licensed independently from syslog ng Premium Edition Learn more Do you need a turn key appliance for log management The syslog ng Store Box SSB is a high reliability log management appliance to collect classify organize and securely store log messages for enterprises who operate log infrastructure for compliance and maintenance reasons As an out of the box log server it consolidates enterprise wide logging needs helping organizations to lower operational risks and costs How can SSB help your business Complete log life cycle management You can utilize SSB as a standard log life cycle management tool collect classify filter store backup and archive logs on a compliant way tailored exactly to fit your business needs Through its intuitive web based interface you can easily manage log messages not just for

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/syslog-management/37/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    staff can do their day to day jobs without changing their working habits Official webpage Privileged activity monitoring Shell Control Box is an activity monitoring appliance that controls privileged access to remote servers and networking devices and records activities in movie like audit trails that can be searched and replayed Central authentication access control SCB acts as a central authentication gateway enforcing strong authentication before users can access your sensitive IT assets In addition it is a policy enforcement point only authorized personnel can access your systems A turnkey solution to control all access over the commonly used protocols SSH RDP HTTP Citrix VNC Telnet Closer employee partner monitoring SCB controls and audits who has done what and when for example in your financial or SAP system Aware of this your employees will do their work with a greater sense of responsibility leading to a reduction in human errors By having an easily interpreted tamper proof activity record finger pointing issues can also be eliminated Faster higher quality audits User sessions are recorded in high quality tamper proof and confidential audit trails The highest quality audit trails ensure that all the necessary information is accessible through ad hoc forensic analyses or pre defined reports Lower troubleshooting and forensics costs When something wrong happens everybody wants to know the real story Analyzing thousands of text based logs can be a nightmare and may require the participation of external experts The ability to easily reconstruct user activity allows you to shorten investigation time and avoid unexpected cost Real time prevention of malicious activities You can monitor the traffic of SSH connections in real time and execute various actions if a certain pattern for example a suspicious command or text appears in the command line or on the screen SCB can send you

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/server-access-control/38/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-17