archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Services/solutions - Data Security Solutions
    technologies and the social business cloud based environment have introduced new IT risks through plug ins add ons and application extensions These risk are compounded by users with local admin accounts who inadvertently expose their PCs to vulnerabilities by installing applications for both personal and social use Not only are attacks becoming more targeted and sophisticated but the sheer volume of new malware signatures is growing at rates that out pace the scalability of traditional technologies Today more than 2 million new malware signatures are identified each and every month but anti virus solutions on average only identify about 19 percent of these within the first day of existence As a result the typical organization must now deal with upwards of 50 malware incidents every month leading to rapid increases in endpoint TCO with rising help desk calls and reimaging costs and lost employee and IT productivity To address the rising volume and sophistication of malware organizations have added numerous point products to their security stack an approach that has quickly become cumbersome and ineffective This approach not only adds complexity to managing and securing endpoints but it reduces overall visibility of the environment leading to more IT risk and increased endpoint TCO The time is now to shift out of the status quo and into a new strategy for endpoint management and security Introducing Lumension Intelligent Whitelisting Lumension Intelligent Whitelisting is the industry s first integrated application whitelisting solution that brings together the combined strengths of patch management application control anti virus and trust based change management into a single integrated solution with a unified workflow that dramatically improves endpoint security effectiveness without impacting organizational productivity Clean endpoints of all known malware Lumension Intelligent Whitelisting scans your endpoint environment and works with Lumension AntiVirus as well as other third

    Original URL path: http://dss.lv/en/pakalpojumi/endpoint-security/application-whitelisting/20/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    and capabilities encompass the L E M S S platform and most of the L E M S S modules including Application Control Patch and Remediation AntiVirus and Device Control Module Application Control Feature Benefit Application Trust Rating Integrates Lumension Endpoint Integrity Service EIS into L E M S S at both admin and end user levels providing explicit identification and application risk rating for increased security control and optimized management of the application ecosystem Software Demo Leveraging Application Trust Scores Application Library Enhancements Provides significant usability enhancements to simplify the task of organizing applications and associated files to be used as policy elements in the Application Library Software Demo Organizing the Application Library Local Authorization Balances end user productivity security and operational friction by providing users with the flexibility to authorize previously un encountered applications on their local endpoint while logging actions for further review by admins Software Demo Empowering Users to Make On the Fly Whitelist Decisions Scheduled Event Log Query Allows admins to easily schedule powerful queries of application endpoint and user logs producing actionable analyses of new application introduction policy violations and overall endpoint application risk Trust Engine Enhancements Further simplifies and automates whitelist maintenance to reduce admin burden by decreasing the time and effort required to incorporate post lockdown and other user changes Module Patch and Remediation Feature Benefit Extended Windows non Security Content Streamlines patch management process and delivers a more effective platform for MS Windows content by combining all security and most non security patches in single solution Accelerates the patch cycle and utilizes existing IT bandwidth more effectively and efficiently Optimized Content Delivery Reduces performance impact on endpoints and provides more timely and more complete patch coverage thereby reducing management overhead Module AntiVirus Feature Benefit Granular AV Policy Management with CPU Throttling

    Original URL path: http://dss.lv/en/pakalpojumi/endpoint-security/endpoint-management-suite/28/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    protect their IT security assets SIEM based Risk Management Risk Compliance Mangement Risk Compliance Mangement Measure Your Security Posture and Align Risk to Business Assets with a Comprehensive IT GRC Solution Demonstrate compliance protect sensitive information minimize brand and reputation loss and address initiatives that improve the business by providing enterprise wide visibility of the IT environment and prioritizing IT risk Official webpage The ability to measure an organization s security posture is vital to maintaining a protected network and a productive IT staff and workforce While organizations today have a multitude of gateway and endpoint controls vulnerability assessments and compliance processes they cannot effectively automate measurement data from these devices and consolidate all of the real world risks and communicate these indicators in a consistent manner to senior management Without the ability to create track and benchmark IT security metrics organizations cannot understand the business impact of their IT risk which can lead to business disruption loss of sensitive information and non compliance with both internal policies and external regulations such as PCI HIPAA HITECH NERC FISMA Red Flags Rule etc By providing enterprise wide visibility of the IT environment including technology processes and people and prioritizing IT risk to focus on the greatest impact to the business Lumension enables security professionals and business executives to demonstrate compliance protect sensitive information minimize brand and reputation loss and address initiatives that improve the business Identify the criticality of IT assets and their role in the support of key business processes and associate IT risk with those key resources Assess your technical and procedural controls for compliance using interfaces to Lumension and third party tools and conduct non technical Web based surveys Prioritize and address technical and procedural control deficiencies assign and track status of remediation projects Create operational and strategic

    Original URL path: http://dss.lv/en/pakalpojumi/security-management/risk-compliance-mangement/29/ (2013-11-15)
    Open archived version from archive


  • McAfee - Data Security Solutions
    to local pan Baltic market McAfee Our solutions are designed to work together integrating antimalware antispyware and antivirus software with security management features that deliver unsurpassed real time visibility and analytics reduce risk ensure compliance improve Internet security and help businesses achieve operational efficiencies Backed by an award winning research team McAfee security technologies use a unique predictive capability that is powered by McAfee Global Threat Intelligence enabling home users

    Original URL path: http://dss.lv/en/razotaji/mcafee/14/ (2013-11-15)
    Open archived version from archive

  • MobileIron - Data Security Solutions
    all sizes protect their IT security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market MobileIron The Platform For Mobile IT Vision MobileIron was founded to bring simplicity to the chaos of mobility Mobile will become the preferred communications and computing platform for end users to do their work However mobile introduces cost risk and usability challenges that traditional IT strategies cannot address MobileIron s approach is to simplify the problem by providing a complete security and management platform for mobile apps docs and devices that preserves the native experience for end users We call this Mobile IT Value MobileIron lets enterprises educational institutions and government Protect data Mobilize apps and content Preserve user experience and privacy MobileIron gives IT the confidence that sensitive data will not be lost while enabling the business to mobilize its workflow and end users to do their jobs more effectively MobileIron s customers are transforming their organizations through mobility From day one MobileIron s focus has been 100 customer success through innovation leadership customer support and best practice development MobileIron MDM MAM Security MobileIron MDM add on modules List of manufacturers AirTight Networks BalaBit Vasco Cellcrypt

    Original URL path: http://dss.lv/en/razotaji/mobileiron/15/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    security services to help companies of all sizes protect their IT security assets MobileIron MDM MAM Security MobileIron MDM add on modules Voice Call and SMS Encryption Secure Mobile File Sharing for Enterprise MobileIron MDM MAM Security Advanced Mobile Device Management combines traditional mobile device management capabilities with comprehensive security and app capabilities powered by the MobileIron platform The administrator can manage the lifecycle of the device and its apps from registration to retirement and quickly get mobile operations under control Official webpage The MobileIron Mobile IT platform focuses on securing and managing apps docs and devices for global organizations It supports both corporate liable and individual liable devices offering true multi OS management across the leading mobile OS platforms MobileIron features Multi OS Device Management Central web based console across operating systems Inventory and asset management Device configuration Encryption policy phone SD Lockdown security camera SD Bluetooth Wi Fi Password enforcement Remote lock and wipe End user self service App Management Inventory Private app storefront Rogue app protection Real World Scale 100 000 devices per server Central console for horizontal scale up to 500 000 devices Complex configurations with secure check in intervals of less than 4 hours Simultaneous registration of hundreds of devices 3 000 concurrent app downloads Rigorous test automation through MobileIron TRUST T est for R eliability U nder ST ress Enterprise Data Boundary Selective wipe Privacy policy Access Control Sentry ActiveSync connection activity and device visibility Blocking of email access Advanced Security Certificate distribution Posture detection Real Time Roaming Notification Alert when roaming internationally Lost Phone Recovery Locate and map Administration Over the air provisioning Role based access Group based actions Broadcast SMS APNs C2DM Persistent logs and audit trails Enterprise Integration Web Services API BES and ActiveSync integration Directory services AD LDAP Certificate authority

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/mobileiron-mdmmamsecurity/7/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    each supported OS platform in addition to separating out internally developed private apps and external public apps With MobileIron IT administrators can directly publish private apps to their end users This accelerates the App Discovery process so the end user can then find and download the application from their mobile device The administrator can also recommend external applications so that the end user knows exactly which ones are supported and not supported by IT Application Security and Access Control Businesses want the ability to securely manage which mobile applications are installed on their devices Using MobileIron App Control administrators quickly select which applications are required allowed or disallowed and then associate these apps with rules that specify the consequences of being out of policy These consequences include blocking further email to the device or sending SMS and email notifications to the user and IT administrator informing them of policy violations Application Inventory Comprehensive management of enterprise applications from a single IT view is essential with the proliferation of applications on mobile devices MobileIron s Application Inventory presents a snapshot of the applications installed across all of your company s managed devices MobileIron administrators use this inventory to track new applications coming into the enterprise determine the popularity of applications and identify possible rogue applications In addition administrators can monitor user adoption of mobile enterprise applications they have built and published Privacy policy settings determine whether Application Inventory information is reported Doc Work Content is the lifeblood of the enterprise When end users choose mobile as their preferred computing platform they immediately need iPhone and iPad access to the documents that are essential for their work In most large organizations two of the main repositories of documents are enterprise email with attachments and Microsoft SharePoint The challenge for the Mobile IT team is to provide a great mobile user experience without sacrificing document security MobileIron Docs Work gives the end user an intuitive way to access store and view documents from email and SharePoint and lets the administrator establish data loss prevention controls to protect these documents from unauthorized distribution Employees can now take full advantage of the iPhone and iPad for secure enterprise content and collaboration Secure Content Hub MobileIron Docs Work creates a secure content hub on the iPhone or iPad for the end user to access and manage corporate documents View documents Store documents securely on the device Protect data at rest with iOS Data Protection Selectively wipe documents when the user or device falls out of compliance Block clipboard cut copy paste access to enterprise content Control whether third party apps can access stored documents Utilize policies users roles groups and permissions already set in MobileIron Docs Work support for Android is planned for a future release as is the ability to provide policy based controls for other trusted apps on the device to individually access secured documents Email Attachment Security Apple s native email app is the end user s preferred email experience on iOS Historically

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/mobileiron-mdm-addon-modules/14/ (2013-11-15)
    Open archived version from archive

  • Radware - Data Security Solutions
    technologies from all across the globe to help companies of all sizes protect their IT security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market Radware Smart Network Smart Business Radware works with the world s largest enterprise and carrier customers to deliver an application infrastructure that ensures the availability scalability performance and security of their of business critical applications Our approach helps them extract maximum value from their IT and people investment while providing maximum agility to support their goals Industry Expertise If you re looking for insights on application delivery for enterprises and carriers alike look no further Radware s team brings a myriad of perspectives has a wealth of experience and has won numerous awards and patents in their respective fields Technology Alliances Radware partners with industry leaders to develop and deliver world class technology Our technology alliances are deep long term relationships where we both invest people and resources to demonstrate interoperability with each others products and assure we bring needed solutions to market Attack Mitigation System Web Application Firewall List of manufacturers AirTight Networks BalaBit Vasco Cellcrypt Centrify ForeScout IMB Security Systems InfoWatch Ipoque Lumension McAfee MobileIron

    Original URL path: http://dss.lv/en/razotaji/radware/21/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-21