Wir schlagen Ihnen folgende Land- und Sprachauswahl vor:

      Sécurité des passerelles

      (63 articles)

                      • Progress MOVEit Gateway
                        Progress
                        Progress MOVEit Gateway

                        MOVEit Gateway propose une fonction de proxy DMZ qui permet de déployer MOVEit Transfer à l'échelle de réseaux sécurisés (derrière le pare-feu), afin de respecter les exigences strictes de conformité souvent associées aux réglementations afférentes à la protection des données, comme RGDP, HIPAA et PCI-DSS.

                        59 produits correspondent à vos filtres de recherche

                      • BeyondTrust Remote Support Concurrent User Subscription
                        BeyondTrust Corporation
                        BeyondTrust Remote Support Concurrent User Subscription
                        Durée: 12 mois
                        Utilisateur: 1
                        Système d'exploitation : indépendamment de plate-forme
                        Segment: Corporate
                        Type: Licence, perpétuelle
                        Réf. produit: 107388102 Réf. fabricant: RSU-SUB
                        Prix sur demande
                        Livraison à partir du 3. juin.
                        Disponible
                      • BeyondTrust Password Safe Named User Subscription
                        BeyondTrust Corporation
                        BeyondTrust Password Safe Named User Subscription
                        Durée: 12 mois
                        Segment: Corporate
                        Type: Licence, perpétuelle
                        Utilisateur: 1
                        Langue du produit: Anglais, Allemand
                        Réf. produit: 107388094 Réf. fabricant: PSU-SUB
                        Prix sur demande
                        Livraison à partir du 3. juin.
                        Disponible
                      • BeyondTrust Endpoint Privilege Management
                        BeyondTrust Corporation
                        BeyondTrust Endpoint Privilege Management

                        BeyondTrust Endpoint Privilege Management offre une solution complète de gestion des privilèges des points d'accès, spécialement conçue pour maximiser la sécurité et la productivité de votre entreprise. Cette solution vous permet d'appliquer le principe du privilège minimal (Least Privilege) afin de prévenir efficacement les logiciels malveillants, les ransomwares et les attaques basées sur l'identité.

                        2 produits correspondent à vos filtres de recherche

                      Software as a key security component.

                      Predatory data theft can put your entire business at risk. Many companies are even required to notify government authorities of serious IT security incidents. Specific security standards have become mandatory to keep the inherent risks of a networked society under control. While an effective security strategy involves far more than just a security suite, it’s important to implement cutting-edge software in all areas of your business. Even if you can’t guarantee one hundred percent security, your company should build its protective barriers as high as possible.

                       

                      Security software to combat intrusion and data theft.

                      In today’s business world, data is shared around the globe in various ways—in the cloud, by e-mail and via mobile devices—each requiring its own type of security. Even sensitive data is stored externally to enable access from anywhere. Rapid growth in the digital age wouldn’t be possible without such open structures but, unfortunately, this also gives rise to devious schemes. It’s therefore essential to protect yourself, and our Bechtle online shop carries effective solutions by leading manufacturers—from Symantec, Trend Micro, Kaspersky and Gemalto to G Data, Tenable and many more. We offer hundreds of software solutions, covering infrastructure, data centres and endpoints.

                       

                      Security as the primary means of data protection.

                      Incorporating notebooks, tablets and smartphones into your network opens up new opportunities for hackers to penetrate your systems. Devices must therefore also be integrated into your company’s security structure—endpoint security management is the name of the game. Nevertheless, each aspect of security is closely linked with all the others. For example, data sharing on mobile devices is also addressed by mobile security and cloud security solutions. Highly specialised software is available from providers such as Kaspersky, which offers Kaspersky Security for Mobile. Also available are security suites, which combine multiple protection programs and usually include antiviruses and firewalls. Additional measures to protect yourself from cyber criminality include network and gateway security. And it’s crucial to raise awareness among your employees. Special attention should be paid to data security and data deletion, requiring excellent management and reporting.