Spain, Santurtzi-Bilbao
... intellectual property in global markets. Our technical translators master specific terminology and legal nuances that ensure the protection of your innovation and regulatory compliance in each region. Benefits of Our Automotive Translation Service Experience and Industry Knowledge: Our translators combine technical expertise with a deep understanding of the automotive sector. Wide Range of Services: From...
...Data security is becoming increasingly challenging due to the growing complexity of IT systems, their interconnectivity through, for example, cloud services, mobility, etc., and the continuously rising volumes of data. You will receive my support in establishing an Information Security Management System (ISMS) in your company. My goal is to empower you to ensure professional IT protection. This...
France, Lille
...The drafting of Safety Data Sheets (SDS) is a specialized service that ensures essential information about the safety of chemical products is properly documented and accessible. These sheets are crucial for ensuring the safety of workers and consumers by providing clear instructions on the handling, storage, and disposal of chemicals. A well-written SDS helps prevent accidents and ensures...
Germany, Eggolsheim
...), it is highly recommended to involve a data protection officer, and in many companies, it is even legally required. We see our core task as monitoring and optimizing the level of data protection within your company to ensure that it is compliant with the GDPR. Based on a comprehensive data protection analysis, we implement all necessary measures within your company. Additionally, we also conduct the necessary employee training on data protection.
...By commissioning us to conduct a personal data protection audit for GDPR compliance, you will receive more than just information on whether your personal data protection system is functioning correctly. Having been in the information security industry for over a decade, we will also provide you with additional insights upon your request, such as whether the IT system your company operates on is modern and scalable, whether it effectively supports the business objectives of the enterprise, and whether it adequately protects data in general (not just personal data).
France, Paris
...The IT transfer service is essential for businesses looking to migrate or reinstall their IT systems securely. Our team of IT experts is dedicated to ensuring that your technological infrastructure is transferred accurately and efficiently, thereby minimizing downtime and disruptions. We use advanced security protocols to ensure the protection of your sensitive data throughout the process. By...
France, Paris
...Our certified training program (ISO/IEC 27701, GDPR Introduction, ISO/IEC 29100, ISO/IEC 27032, …) is open to everyone! Do you also want to learn and improve through various certified training courses? By collaborating with PECB, a leading global provider of comprehensive examination and certification services, ONE GDPR offers all training in information security and cybersecurity. Want to train in another discipline? ONE GDPR can also provide you with the appropriate training!
United Kingdom, London
...We specialise in all aspects of Cybersecurity and in particular Cybersecurity Asset Attack Surface Management (CAASM) and Cybersecurity Asset Management (CSAM). Our expertise extends to the identification, management, and protection of all digital assets against evolving cyber threats. We are confident in designing and implementing all information security framework solutions, prioritize the protection of your hardware, software, and network devices, preparing for and responding to any incidents with agility and expertise.
Germany, Ulm
...We provide you with comprehensive and practical advice on data protection. As part of our data protection consulting, we work together with you to design data protection-compliant business processes. To this end, we develop solutions without unnecessary additional effort, enabling you to efficiently achieve your goals while adhering to all data protection regulations.
South Korea, Seongnae-Ro 6-Gil, Gangdong-Gu, Seoul
...EYL applies the natural process of radioisotope decay, commonly used in consumer medical devices, smoke detectors, and watches, to the use case of cryptographic information security. By exploiting the true randomness (entropy) of this quantum process, EYL's technology brings optimal security protection to a wide range of ICT and IoT products, at an affordable price. It's a game changer. ...
Ukraine, Kyiv
...) Installing upgrades, updates and new software......... 10) Performance tuning for optimized results......... 11) Checking computers & servers for computer viruses and treating them......... 12) Consultations on information security and information protection......... 13) Creation of backup copies of critical data......... 14) IT security and video surveillance systems management and setup......... 15) Corporate telephony systems management and setup...
Matching products
IT Support
IT Support
France, Paris
... Assessing risks and their criticality What risks and threats, concerning which data and activities, with what consequences? Researching and selecting countermeasures What should we secure, when, and how? Implementing protections and verifying their effectiveness This is the culmination of the analysis phase, and this is where the protection of the information system begins. A common weakness of this phase is failing to verify that the protections are indeed effective.
...Support as a Data Protection Officer or Implementation of Basic Data Protection If you are a small or medium-sized enterprise that has not yet implemented data protection in accordance with the GDPR, we support you not only with consulting but also through services. Our specialty is the practical and individualized implementation of the topic at reasonable prices. You can either implement...
Germany, Fröndenberg / Ruhr
... the following: personal data Personal data refers to any information relating to an identified or identifiable natural person (hereinafter referred to as "data subject"). (...) FULL PRIVACY POLICY: https://www.rainbow-shop.de/content/datenschutz/?ReferrerID=33...
ufs.country_names.RU, Moscow
... intelligence and machine learning Robotisation in business processes, trade and services Big Data – collection, turnover and management of massive data Internet of things / Industrial Internet of things Blockchain / Distributed ledger technology Information protection, cybersecurity Data storage, cloud solutions Digital technology, platforms, products and services Payment systems and e-commerce Social online platforms and applications Platforms for P2P payments and financing Crypto exchanges, crypto funds and crypto banks Investment / project financing / ICO Our team brings together top notch...
...Proper Disposal of Sensitive Data When it comes to document destruction, the protection of your sensitive data is our top priority. Sensitive corporate data and personal information must be disposed of properly by companies. In this critical security area, trust and expertise are essential. We handle document destruction for you, strictly adhering to the regulations of the Federal Data...
Germany, Meerbusch
... Protection Regulation (GDPR), even if a data processing agreement (DPA) is in place. Many providers are not equipped to handle the specific requirements of this legal situation. By using these services, you are at least operating in a legal gray area. This may also unsettle your customers, partners, and employees. For more information, please visit: https://www.deltakonzept.de/loesungen/bigbluebutton/ We look forward to hearing from you!
France, Paris
... encryption, robust firewalls, and continuous monitoring, ensuring the protection of your data and infrastructure. Turnkey Solution Our solution includes everything: hardware, software, support, and maintenance. We manage the entire lifecycle of your cloud infrastructure, allowing you to focus on your core business. Try for Free Choose our automated private cloud and experience advanced, secure, and accessible technology. Try our services for free. For more information, visit our website NSAM Cloud.
United Kingdom, London
...or local government divisions that are at risk of Corporate Espionage. The risk assessment and analysis aim to ascertain the likelihood of loss of data or confidential information through the planting of covert transmitting ...
...Visit our website for more information. "Our µCAN modules" are the link for networking analog and digital I/O signals over the CAN bus. They offer a wider temperature range, better resolution, broader supply voltage, and higher protection classes. With our FDready system, we enable faster data transmission rates without additional investments. 2. Controllers Our µMIC.200 family offers advanced...
United Kingdom, London
United Kingdom, London
...As an accredited BCS and IAPP training partner, Freevacy is proud to be regarded as one of the UK's leading independent GDPR training providers. Freevacy is an information rights learning and development specialist. Established in 2015, we deliver professional workplace qualifications, and custom data protection online training services throughout the whole of the UK. Accredited Data Protection...
United Kingdom, Bedford
...As an accredited BCS and IAPP training partner, Freevacy is proud to be regarded as one of the UK's leading independent GDPR training providers. Freevacy is an information rights learning and development specialist. Established in 2015, with a training facility and headquarters in Bedfordshire, we deliver professional workplace qualifications, and custom data protection training services...
United Kingdom, Sevenoaks
... company, cisco consulting, it solutions London, consulting London, green it consulting, information security consulting, it consulting london, it service monitoring, it solutions, red hat enterprise linux 6, red hat support, storage area networks, it consulting uk, networking security, data security, network protection, it security policy, it security management, it security solutions, it security products, IT security, security service, data security, security management, security solution, ,cisco consulting, cisco services, cisco support, information security consulting, security consulting...
We provide Data Protection Officer (DPO) services, advice, compliance, and training on data protection and cybersecurity regulations, as well as the implementation of procedures, controls, and protocols in accordance with them. In one single company, you will find all the professionals you need to protect your business or organization’s information. Certified data protection officers, cybersecurity specialists, lawyers, and other categories of professionals will be at your service to ensure proper compliance with data protection and information security regulations.
United Kingdom, Kingston Upon Thames
Managed IT support services you can rely on! We are an IT managed service provider (MSP) based in Kingston upon Thames, Greater London, serving our SME customers the highest quality, enterprise-level IT support services. The best in class IT infrastructure, cloud-based solutions and premium cyber security protection trusted by the Greater London Authority, University College London, Promethean and the Met Police. Outsource all the hassle of an in-house IT department.
United Kingdom, Chichester
... opt-in email addresses, with an average recency of just six months, for your lead generation, lead nurturing and email marketing campaigns. Already Fully Compliant There is much coverage of the implementation of the EU Data Protection Regulation and how this might affect direct marketing and email marketing across Europe. MI Europe is the only international B2B marketing list already compliant with all aspects of the proposed data protection regulation!
France, Lyon
Data Need Advice, a consulting firm specializing in personal data protection based in Lyon, is here to safeguard the DNA of your business by assisting you with data protection: - Data Protection Officer - GDPR Compliance Audit - Personal Data Protection Tools - Compliance Monitoring - Digital Ethics...
United Kingdom, Leigh
... shared with them would be safe and kept away from any third party. They take utmost care of this and strictly adhere by the policies made under the Data Protection Act, especially while taking your credit card details or any other private information. Their finest range of all the products at the most affordable prices would, surely satisfy you as a consumer. Therefore, be it coffee machines, vending tea, sugar, slush syrups, skimmed milk or any other coffee making ingredient of equipment, you can count on Coffee Seller for buying any of these things.

The europages app is here!

Use our improved supplier search or create inquiries on the go with the new europages app.

Download in the App Store

App StoreGoogle Play