• europages
  • >
  • COMPANIES - SUPPLIERS - SERVICE PROVIDERS
  • >
  • applications security

Results for

Applications security

GermanyMunich, Nuremberg and BavariaService Provider
  1. JEGO INGENIEURBÜRO GMBH

    Germany

    JEGO Ingenieurbüro GmbH provides engineering and consulting services in the field of substation automation. We offer our professional service to support the digitalization of the electrical power grid. Our service portfolio covers a variety of different vendor’s substation automation, control and protection devices for medium and high voltage applications. The following key words are part of our portfolio: FIDIC, Consulting, Circuit breaker, transformer, protection technology, control technology, differential protection, overvoltage protection, distance protection, secondary technology, primary technology, Digitization, FAT, SAT, engineering, project management, consulting, commissioning, electrical engineering, power engineering, Network technology, PRP, RSTP, HSR, PTP, NTP, Switch, TCP IP, Serial, IED, Process bus, I&C protocol, SCADA protocol, RTU, GOOSE, IEC 61850, Sampled Values, MMS, IEC 60870-5-104, DNP, MODBUS, Process Bus, RTU, Digital Twin, Cyber Security, IT Security, Digital Substation, SAS (Substation Automation System), SCS (Substation Control System), Field Control Units, Station Bus, SCADA, SCADA system.

  2. BARAMUNDI SOFTWARE

    Germany

    baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Customers of all sizes and from every sector benefit from the independent German manufacturer's many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards. baramundi Management Suite optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of all endpoints. It relieves the pressure on IT administrators and ensures that wherever they are, users always have the necessary rights and applications on all platforms and form factors, whether on PCs, notebooks, mobile devices, Macs, or in virtual environments.

Filters

Results for

Applications security

Number of results

2 Companies

Company type