Austria, Maria Anzbach
...The Protection Cage, or IT Security Cell, protects IT against external damage such as fire, extinguishing water, construction moisture, dust, burglary, or sabotage. The Protection Room is an IT Security Cell built to the required standards of the BSI and insurance providers. It offers enhanced protection for your IT. The system of the IT Security Cell is dust-free and can be easily integrated into almost any building structure. Verified Security: Fire Moisture: Temperature increase Dust: Water, etc.
Germany, Pulheim
...We offer all the fundamental elements of IT security up to customized solutions.
United Kingdom, London
...Are you a small business owner looking to protect your assets from cyber threats? Look no further! Our IT security services are budget-friendly and tailored to meet the needs of your business. Don’t leave yourself vulnerable to attack – invest in IT security today.
Germany, Heinsberg
...The pentest, or penetration test, is a method used to ensure the security of an IT system. During the pentest, attempts are made to breach the security of this system using the same tools and techniques that an attacker might employ. The penetration test simulates a hacker attack in a controlled environment. A detailed documentation of the results is provided to assist developers in addressing...
Ukraine, Kyiv
...) Installing upgrades, updates and new software......... 10) Performance tuning for optimized results......... 11) Checking computers & servers for computer viruses and treating them......... 12) Consultations on information security and information protection......... 13) Creation of backup copies of critical data......... 14) IT security and video surveillance systems management and setup......... 15) Corporate telephony systems management and setup...
Matching products
IT Support
IT Support
Germany, Darmstadt
...Cybersecurity Benchmarking: IT Security Score for Your Company - How Secure is Your Company Really? Typical Questions / Use Cases: How does my IT security compare to the competition? Which of my subsidiaries has weaknesses in IT security? How should I assess the IT security of my critical suppliers? What specific actions do I need to take to improve IT security in my company? Consultation and support for implementation available upon request.
... business. With IT outsourcing at NOVELYNX, you can focus on core activities, leaving IT matters in the hands of our IT experts. Our team in Bielsko-Biała, serving companies from Silesia and Lesser Poland, offers full technical and operational support, helping to increase efficiency and ensuring compliance with GDPR. IT outsourcing at NOVELYNX guarantees reliability, operational efficiency, and IT security for your company.
Matching products
IT Service Leader
Outsourcing IT
"IT services from a single source"? – Absolutely, we live and breathe this concept. You can rely on us. As an IT service provider based in Hamburg, we are your local contact, as our strengths clearly lie in the local market; we understand what matters to our partners on the ground. Are you looking for a service provider to train your employees on-site? Look no further, as you have found the pe...
Germany, Regensburg
...EDGE, CSD Antenna connections: 2x Mobile: SMA-f (Rx Diversity, MIMO) Full NAT: IP/Port Forwarding, Netmapping Redundancy: PPPoE for external DSL modem, 2 Dial-Out targets IT Security: stateful firewall, no backdoor VPN: OpenVPN, IPsec, GRE, PPTP Detection: Link loss, Link up, Failed Login Authentication: PAP/CHAP, RADIUS Configuration: Web interface, CLI, Text/Binary file Programmable: INSYS...
Germany, Berlin
... - Administrator - IT Security Project Manager - Cloud Security Engineer - IT Security Engineer - Data Protection Officer In addition, our advisory circle includes: software developers (programmers, frontend and backend developers, database developers, full-stack web developers, desktop developers, data scientists, CRM, ERP, and CMS developers, embedded developers, DevOps developers, etc.), infrastructure experts such as administrators and IT architects, and many more.
Germany, Ulm
...We provide you with comprehensive and practical advice on IT security in your company. Business continuity management, information security, and disaster recovery are essential components of a sustainable growth strategy. Security incidents can bring your business to a standstill.
Germany, Dinkelsbühl
...Welcome to SL Service GmbH Dinkelsbühl - your competent partner for IT and security services.
Matching products
IT and Security Services
IT and Security Services
France, Lille
• Doctor of Pharmacy, specializing in industry and with training in medical toxicology from Paris 7, Valérie de Fougières has over 20 years of experience in cosmetic and pharmaceutical regulation. • Her career has led her to address compliance issues for cosmetic products in Europe and outside Europe, within her company VDF Conseil, established on March 1, 2005. • VDF Conseil offers its expertise ...
Germany, Augsburg
...SSL Encryption (HTTPS) What is SSL encryption? Websites that are encrypted using the SSL protocol ensure secure data transmission over the Internet. It’s hard to believe, but more than 25 years after the introduction of SSL (Secure Socket Layer) and HTTPS (Hypertext Transfer Protocol Secure) by Netscape, countless unencrypted websites still exist without a "security lock."...
Portugal, Lisboa
...Audit State of WordPress Security Check of Used Plugins State of Updates State of Backups State of PHP Version Existence and State of SSL Certificate Users and Passwords Implementation Resolution of Issues Found in the Audit Installation of Backup Plugin Installation of Backup Plugin Add-On for Unlimited File Size (offer valued at $69) Installation and Configuration of All in One WP Security & Firewall Plugin...
Germany, Bad Bellingen
...Thanks to its unbelievable adhesive power it cannot be removed. If a container opening is closed with seal-it, then the container cannot be opened without destroying the seal-it label. seal-it is additionally provided with several cross-perforations which immediately tear when manipulated like a motorcar tax disc. Length:178 mm width:30 mm Pieces per roll:500...
...The disposal of electronic components, especially sensitive data carriers, requires a high level of quality and security.
Belgium, Nivelles
...We support you throughout the entire digital transition of your institution. More than 120 educational institutions and PMS centers have already benefited from our services, such as: - On-site or remote IT support, - Comprehensive network analysis, - Website creation/modification, - Cabling and network management, - Professional Wi-Fi solutions, - IT security, - Interactive projection, - GDPR compliance, - Custom servers, - Maintenance, - Collaborative work platform, - Modification of digital valves with SchoolBoard.
...Industry 4.0 companies are Digital and Connected; Cybersecurity becomes a fundamental strategic element. IT solutions for security cannot be overlooked, as this could lead to a complete halt in Business Processes. Cybersecurity must be managed with Proactive strategies to anticipate potential Risks and with Reactive strategies to address any incidents that may arise. It is essential to establish...
Poland, Rzeszów
...Honeycomb wrapping paper is an eco-friendly alternative to bubble wrap. Thanks to the appropriate incisions, the paper, when stretched, creates a honeycomb structure that gives a 3D effect. It is very flexible, thanks to which it perfectly adapts to the shape of the products, providing them with even better protection during transport. It has a security feature and is very effective. Honeycomb...
Germany, Nürtingen
...ADS-TEC Industrial IT offers two series of routers/firewalls for network security in industrial environments: the IRF1000 and IRF3000 series. These firewalls are true complete solutions when it comes to security. Each product offers multiple functionalities. The firewalls excel as remote maintenance centers, routers, or edge devices, controlling and securing connected machines and systems locally...
Germany, Bremen
...Private or corporate clients benefit from the development and securing of existing or newly planned IT systems as well as their connected IT components.
France, Paris
... and Networks: Master support and maintenance techniques. - Systems Security: Protect data and infrastructures against cyber threats. Other Topics - Virtualization and Cloud: Techniques for managing virtualized environments. - Advanced IT Security: Protection against cyber threats. - Systems Maintenance: Optimization and troubleshooting of systems.
Belgium, Lokeren
...Small data centre for the protection of server and storage applications. Two-door system for simple operation and cable duct in both side elements. LS Micro Data Centre, Level E Benefits:Expandability for graduated investment in line with IT growth. Applications:A high level of protection against potential physical threats for IT Material:Sheet steel, coated Enclosure Colour:RAL 7035 Service...
Germany, Hamburg
... cost you valuable data. In the future, risks will continue to increase, requiring companies to implement comprehensive IT security solutions focused on corporate and data security, encryption, backups, and disaster recovery.

The europages app is here!

Use our improved supplier search or create inquiries on the go with the new europages app.

Download in the App Store

App StoreGoogle Play