archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Services/solutions - Data Security Solutions
    of all the holes in the company s applications Vulnerabilities in the web infrastructure can appear when new features are introduced to applications Even if applications written by a company s Information Systems team are almost perfect one must still consider the security issues which can occur when running third party applications And since building security into application code requires constant revisions breaches can creep in when security fixes are implemented by programmers In addition Payment Card Industry PCI Data Security Standard DSS a standard developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud hacking and various other security issues is now a mandatory compliance which a Web application firewall addresses Learn more about our attack mitigation solutions today Comprehensive Web Application Threat Mitigation Companies are searching for a single solution that has comprehensive protection abilities does not cause costly redesign of applications does not require time consuming manual configuration or disrupt availability of applications to users The solution must also provide regulatory compliance in reporting and must always be on to accommodate today s 24 x7 society Radware s AppWall is an advanced Web application firewall securing Web applications and enabling PCI compliance AppWall incorporates advanced patent protected Web application security filtering technologies to seamlessly detect threats block attacks and report events Maximum Web Application Threat Mitigation through Negative and Positive Security Models AppWall supports a negative security model ensuring that all risky Web traffic is blocked including inspection of sensitive fields that can be defined using custom patterns such as Social Security numbers or credit card numbers AppWall also employs a positive security model guaranteeing that only Web traffic that complies with Web application behavior is passed through while all other traffic is blocked without requiring

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/web-application-firewall/12/ (2013-11-15)
    Open archived version from archive


  • PGP - Data Security Solutions
    market PGP Symantec s encryption products enable organizations to deliver comprehensive data protection with proven standards based technology Our easy to deploy solutions provide centralized policy management accurate compliance based reporting and true universal management of our encryption products What is Symantec Encryption Symantec s encryption solutions enable organizations to deliver data protection with centralized policy management through the optional use of Encryption Management Server Our solutions provide standards based

    Original URL path: http://dss.lv/en/razotaji/pgp/16/ (2013-11-15)
    Open archived version from archive

  • SecPoint - Data Security Solutions
    and automatically alerts about new vulnerabilities It has a user friendly interface that can be operated by technical and non technical personnel Protector Ultimate Firewall Appliance comes with the best Advanced Anti Spam and Multiple Anti Virus scanning It has web filtering with groups policy It fully integrated with Microsoft Active Directory for both Anti Spam Individual User quarantine and Web filter Firewall and VPN allows you to set policies and secure incoming and outgoing traffic The Content Filter allows to control all content on the network Intrusion Prevention Module helps eliminate local and external threats It has a user friendly Interface that allows both less technical and advanced users to manage it without training Portable Penetrator Best Wifi Password Recovery Suite Effective for WEP WPA WPA2 and WPS key recovery Easily installs on Windows 7 Windows 8 Mac os X or Linux Running via virtualized software such as VMware Player VMware Fusion Operates with a powerfully USB Alfa antenna for biggest efficiency and wireless range scanning An user friendly interfaces gives fast operation and comes with easy step by step install guide and videos Cloud Penetrator Best Web Vulnerability Scanner Quickly identify vulnerabilities in your perimeter web servers mail

    Original URL path: http://dss.lv/en/razotaji/secpoint/22/ (2013-11-15)
    Open archived version from archive


  • Proofpoint - Data Security Solutions
    curve and a rapidly changing threat landscape through continual innovation and a unique focus on enterprise communication and collaboration risks Patented and unparalleled technology puts Proofpoint in a class by itself Proofpoint MLX machine learning the application of big data analytics and the use of global threat correlation systems deliver unrivalled anti spam and data loss prevention accuracy DoubleBlind Key Architecture ensures the complete security of archived email and other data High speed search technologies enable rapid discovery with guaranteed performance Proofpoint customers benefit from the scalability performance and economic advantages of Proofpoint s ongoing investment in the latest innovations in virtualization and cloud computing The Proofpoint Difference Proofpoint s pioneering use of innovative cloud based technologies including big data analytics machine learning deep content inspection and advanced encryption provides our customers with both superior protection against the latest advanced threats as well as lower total cost of ownership compared to alternatives provided by traditional security vendors Proofpoint s solutions uniquely deliver Superior Defense against Today s Advanced Targeted Threats Leveraging big data analytics deep content inspection and machine learning Proofpoint detects and stops targeted spear phishing and other advanced attacks more effectively than competing alternatives By processing and modeling billions of messages per day big data analytics allow Proofpoint to spot anomalies in traffic flow to detect targeted attacks Deep content inspection enables Proofpoint to identify malicious attachments and distinguish between valid emails and phishing emails designed to look authentic and trick end users into divulging sensitive data or clicking on a malicious URL In addition Proofpoint leverages advanced machine learning to detect and quarantine targeted zero hour attacks in realtime even if they have not been seen previously at other locations The combination of these capabilities along with closed loop incident response delivers a level of data protection

    Original URL path: http://dss.lv/en/razotaji/proofpoint/18/ (2013-11-15)
    Open archived version from archive

  • SpectorSoft - Data Security Solutions
    reporting on computer and smartphone activity providing you with detailed timely and actionable activity information Founded in 1998 SpectorSoft is headquartered in Vero Beach Florida with offices in West Palm Beach FL Park City UT and Surrey in the UK Our 36 000 corporate customers and over 900 000 home users must be on to something as SpectorSoft has been recognized again and again for innovation quality and growth by leading industry publications Our work solutions let companies address the most serious and pervasive security issues Insider Threats while helping IT admins address these issues in less time From focused investigations to powerful intelligence we ve got you covered Our home solutions allow concerned parents to keep an eye on their children in the virtual world just as they do in the real world And because those worlds are increasingly interconnected our customers share stories about real world problems they were able to solve because of our virtual world help Internet Tracking Employee Monitoring Software SpectorSoft designs products that allow you to record and view what employees and children do on the computer and specifically what they do on the Internet Our products are especially popular with people who want

    Original URL path: http://dss.lv/en/razotaji/spectorsoft/24/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    logons indicating employees utilizing credentials of other employees to gain access and participate in one of the previous Insider Threat forms Productivity Loss See which employees are wasting time on personal activities on the Internet While not a threat that would take a business down productivity loss can be material The Top 5 Reasons organizations turn to SPECTOR 360 User Activity Monitoring Track and enforce electronic Acceptable Use Policies Protect valuable Intellectual Property and trade secrets Identify security breaches and risks Monitor and audit compliance requirements Benchmark user productivity You can also use SPECTOR 360 to Recover lost communications such as email chat and IM Assist Help Desk with computer recovery Eliminate or minimize legal liability Obtain data to support accusations of wrongdoing or provide proof of innocence Eliminate or minimize security breaches Detect the use of organization resources to conduct illegal or unethical activities Active or Focus Time A Key Distinction SPECTOR 360 also distinguishes between active time and focus time This means that you can tell the difference between an application opened and left idle and one that is opened and actively used When working to optimize productivity improve training and gather application metering data this distinction is invaluable Keyword Alerts Audit Trails and Peace of Mind Beyond its powerful capture and analysis functions SPECTOR 360 offers instant keyword alerts and complete audit trails so you can dig deep into the issues most critical to your organization Keyword alerts are an invaluable way to quickly and instantly learn if users have acted in ways that require immediate notification or action The keyword alerts can be customized allowing you to insert tokens for the key data fields you are interested in including fields such as triggering event user or user group time stamp or computer name Additionally SPECTOR 360 offers complete Administrator Audit trails and reports of Control Center Activity This feature ensures all vital changes such as client installs client uninstalls changes in profiles and changes in user group members are captured and displayed in an intuitive before and after manner In the final analysis SPECTOR 360 offers what is perhaps the most elusive and valuable business benefit of all the peace of mind you attain by having captured analyzed and acted appropriately decisively and with confidence Easy to Read Reports Just Click SPECTOR 360 takes the recorded activity from each user s PC Mac or BlackBerry and feeds that information into a database and provides more than 75 built in easy to read comprehensive Quick View reports Plus it s easy to create unlimited custom reports to suit your organization s specific needs Using SPECTOR 360 s powerful Quick View reports you will quickly find answers to questions such as How are users communicating with customers and each other Are employees or contractors visiting inappropriate or dangerous websites Which applications are used most See this information detailed by Active Time Total Time and Focus Time Who is accessing transferring and printing sensitive IP Who is ignoring Acceptable

    Original URL path: http://dss.lv/en/pakalpojumi/endpoint-security/surveilance-monitoring/23/ (2013-11-15)
    Open archived version from archive

  • Protected Networks - Data Security Solutions
    the first prototype working closely with our customers After founding the company in January 2009 and being granted financing through our investors protected networks com developed and presented the first finished solution in the third quarter of 2009 Complete Security The company sees its strengths in the development of a homogenous and integrated solution which combines several functionalities and change a the way in which access rights management is traditionally approached Our solution is strongly orientated along best practice business processes and individual use cases New ways of presenting information reducing functions and information to the essential and a strong user orientation differentiate the solution against other players in the field Behind Scenes The founding team has a wealth of experience in the areas of IT security product realization and marketing We also have an extensive background from a variety of of companies regarding access rights management With a team of developers that has already proven its capabilities and expertise in various areas of the ICT segment protected networks com covers all competencies that are needed for a scalable and performant solution in this area Access Rights Management The management of Data Access Rights is one of the most important jobs of your IT department Unfortunately though the tools available on the market today are not even close to providing the required transparency and overview of this business critical process In most cases the tools are cumbersome and very technical and therefore offer few opportunities to standardise and streamline the Access Rights Management Process IT departments everywhere are also facing a constant increase in the complexity and number of systems to manage Despite this there is a permanent call for rationalisation streamlining and ultimately cost cutting Additionally there is a constant increase of data diverse content in different formats in

    Original URL path: http://dss.lv/en/razotaji/protected-networks/19/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    rights are as complex as the companies they represent we decided to put our focus on the visualisation of access rights so that each company can get an understanding of its internal structure and complexity This visualisation makes it easy for clients to understand the individual challenges and unique risk factors affecting their data security The specially developed 8MAN graphical interface ensures that permissions across all resources Active Directory File Server and SharePoint are presented quickly and are clearly understandable Access and User Rights Management Assigning and managing permissions Temporary permissions and group memberships Scalable and integrated across different locations Browse permissions The 8MAN graphical interface displays the existing rights situation in AD group structures NTFS permissions and SharePoint down to the individual user level This provides a quick and simple overview of current rights structures in the form of a graph list or tree structure depending on your preference Access reports Seemingly simple questions like Who actually has access to this directory or Which folders are available to Mrs Smith are extremely difficult to answer if limited to native tools Using 8MAN you can easily run reports on all file server and SharePoint environments This is done automatically and effortlessly and can easily show and document where users or groups have full limited or even no access Manage users When creating or editing user accounts in Active Directory assigning rights on file servers or SharePoint 8MAN supports the requirements of HR IT and help desk members The use of role based templates ensures a ra ts 8MAN allows you to trigger scripts enabling a wide variety of new functionality related to any Active Directory object The integrated logbook documents all activities and fulfills various compliance requirements Data owner security through expert knowledge Department heads and their executives know which

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/8man/41/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-19