Germany, Hamburg
... Specification for Weighing — Data security through encryption — Simple, intuitive operation Functions:data exchange Applications:industrial (food,pharma,packaing),Ethernet,TCP,industrial networks,OPC server connection Operating system:Windows...
AUTOMATA CONSULTANTS AND ENTREPRENEURSHIP offers comprehensive solutions and consulting services to drive growth and optimize business efficiency in an increasingly digital environment. Our expertise covers all facets of IT, from custom program design to development, maintenance, installation, and distribution. We also provide complete support in creating and managing websites, social media platfo...
... technology allows you to automate documentation, streamline workflows, and minimize non-compliance risks. Why Choose ESMACS? Secure and Reliable: Your documents are protected with state-of-the-art encryption. Smart Automation: Say goodbye to manual errors and repetitive tasks. Comprehensive Compliance: Stay informed with real-time updates and tailored tools. User-Friendly Access: Enjoy an intuitive platform that lets you access documents anytime, anywhere. Ready to transform your compliance processes? Subscribe to our channel and join us on the journey to a more secure, automated future!
United Kingdom, London
D-Tech Solutions a long-establish provider of IT-support services, a managed service provider and a cloud computing specialist. We are a small, family-owned business providing bespoke services for small businesses in and around Greater London. We work and collaborate with our clients to create solutions that work for them. We take ownership of a problem, a project or a task and remain accounta...
Belgium, Fernelmont
... connection key that allows for secured device identification on the recovib.io platform and communication encryption. The MONITOR embedded software automatically takes care of re-transmissions and device re-connections in the event of a poor quality communication link or connection loss to the RECOVIB.IO platform – allowing for a high quality of service even from remote and unattended locations. Monitoring Devices status, connectivity and configuration can be managed remotely making deployment and installation a seamless operation.
Germany, Berlin
... makes it easy to get your fleet up and running in no time. With Cynatix Fleet, you can transparently and reliably calculate costs in advance – without hidden additional costs, without surprises. Hardware and software, warranty services, and customer support – all included. Server location: Germany SSL encryption: Yes GDPR compliant: Yes Scope of delivery: OBD2 connector1 including SIM card (already activated) Shipping: Free nationwide (DHL) Money-back guarantee: Yes (30 days) Customer service: Yes...
France, Paris
... discover all the laws on a single platform? - ONE Cookies You have a beautiful website but don’t know how to make your cookie banner compliant with GDPR? Unsure how to write your cookie policy? We can assist you with our software! - ONE ANALYTICS Do you want a benchmark tool for audience analysis for your website that is 100% GDPR compliant? Contact us without delay!
United Kingdom, Bournemouth
... endpoint protection, mobile threat defence, server security and full disc encryption, with more advanced functions including XDR detection and response capabilities. With ESET Managed Detection and Response (MDR) services, businesses can benefit from 24/7 threat monitoring and rapid incident response, enhancing their digital protection without needing in-house experts.
Matching products
ESET UK
ESET UK
Germany, Konstanz
... (S/MIME, PGP) - Master/Master HA cluster - Support for hardware security modules (nCipher, Safenet, Utimaco, Securosys) - Automatic request for end-user certificates via the built-in CA or external CA (EJBCA, GlobalSign EPKI, etc.) - DLP (Quarantine, Block, Enforce Encryption) - Packages for Ubuntu, Debian, RedHat/CentOS, SUSE - Virtual application for VMware & HyperV...
Germany, Ebersbach-Neugersdorf
... system XY? No problem. Do you also want a customer portal? No problem. Ticket Service Support Email Requests Helpdesk Basic functions: Tickets, ticket types, prioritization, assignment Email-to-Ticket: via IMAP, SMTP Telephone system integration: all manufacturers (integration depth varies by manufacturer) Additional integrations: Git, time tracking Security: SQL injection protection, XSS protection, hashed and salted password encryption PDF export: according to custom layout Access control: implementable according to your specifications...
... Monitor and control plant data from the palm of your hand with Horner WebMI Monitor and control data from your computer, tablet or phone Published directly from the OCS Controller Developed completely within Cscape State-of-the- art HTML5 development without the need for web programming skills High level security algorithms – 128-bit SSL encryption Assign a level-based access to specific users Scalable Vector Graphics (SVG) Licensing and registration process is quick and easy ...
A dynamic, young company in continuous relationship with customers who know what they are looking for, finding in us an ideal partner for their intent, staying within the limits of what is possible. The company is on the rise and wants to continue its mission, ensuring to find quality at a fair price that is easily accessible. For inquiries from individuals outside the Eurozone, please write in yo...
ufs.country_names.RU, Moscow
France, Cholet Cedex
...- Users can access the application 24/7, regardless of their workplace. - Kelio servers are hosted in our secure data center. You don’t have to worry about the IT infrastructure (servers, databases, backups...) necessary for the proper functioning of Kelio. - The SaaS business model is based on a single monthly fee. It requires no investment or capital lock-up. - Kelio On Demand is installed in a highly secure hosting center: data encryption, backups...
Germany, Hildesheim
...The best and most popular Kaspersky security solution Get premium protection for the whole family on all devices against viruses, ransomware, unauthorized access to webcams, a password manager, VPN protection, and 87 other technologies – with just one license. Blocks viruses, Cryptolocker, and other threats Protects payments with powerful encryption* Secures passwords and recordings of personal...
Germany, Heinsberg
... vulnerabilities. After the vulnerabilities have been addressed, the tester re-evaluates the identified weaknesses and updates the risk assessment. Additionally, we provide recommendations on which antivirus software solution is currently the best on the market. https://video.wasacon.com/c/wasacon/videos/fmD07RVM...
Germany, Hallbergmoos
... between services is based on a documented API (OpenAPI standard) Integrability 2: Can be utilized by third parties via APIs. Scalability & Redundancy 1: The service is capable of allocating more resources to handle peak loads. Scalability & Redundancy 2: Service is operated at least at 3 different locations to ensure availability. Scalability & Redundancy 3: Public cloud provider: Compliance with HIPAA, GDPR, and CCPA. Protocol: MQTTs API: All APIs are provided over HTTP with TLS encryption.
... and implement high-security networks. Through certified professionals, we cover the areas of installation and support for antivirus and firewall software, as well as network monitoring systems. All mentioned network security functions can also be realized through efficient hardware solutions. Our qualified staff at the IT Center is happy to assist you in planning and implementing new technology, as well as in reviewing existing technology.
Germany, Marksuhl
...overlay lamination, and chip encoding. PowerPerso DLE - Decentralised Card Personalisation With the PowerPerso DLE you get a compact device for decentralized personalisation of ID documents. The high-quality laser engraving technology combined with a contact, contactless or Dual Interface encryption method for personal data offers you maximum security for highly secure ID documents. Pearl ID - Centralised Card Personalisation Pearl ID - Centralised Card Personalisation The Pearl ID is a fast and modular personalisation system for all kind of personalisation tasks with unrivalled...
Germany, Gailingen
... applications in water supply where, for example, there is no power supply available in elevated tanks or pumping stations. The specifications in detail are: - Receiver sensitivity 116 dB - Transmission speed up to 140 kBit/s - Access Point, Client, Router, and Bridge in one device - 400..480 MHz, 10mW to 10 W, adjustable - Range without line of sight several kilometers - RS232, USB - 128 Bit AES encryption and firewall - 4 digital inputs, of which 3 can be configured as pulse inputs - 2 analog inputs - SDI-12 input - Configuration and diagnostics via USB...
ufs.country_names.RU, Moscow
...-63 enhance highly secure authentication, encryption and management to protect your data efficiently between public and private networking. Housing:IP40, DIN Rail / Wall mounting Dimensions(HxWxD):110x60x106 mm Weight:450 g Power input:10 ~ 32VDC Power consumption:7W Operating Temp:-20 ~ +70°C Humidity:0 ~ 95% (non-condensing) EMC:CE, FCC, EAC...
Germany, Köln
...Overview of SQL Server 2014 Features: - New "In-Memory" feature: Up to 30 times acceleration of transactions and data uploads thanks to simultaneous data compression - "Always On" ensures high availability and rapid disaster recovery - Enhanced scalability for servers, networks, and storage - Improved security enhancements for transparent monitoring and secure data encryption - More efficient...
Germany, Pforzheim
Germany, Darmstadt
...With the eperi Gateway, you protect sensitive business data and applications through encryption and pseudonymization before the data is stored in the cloud.
Matching products
eperi Gateway
eperi Gateway
France, Paris
... encryption, robust firewalls, and continuous monitoring, ensuring the protection of your data and infrastructure. Turnkey Solution Our solution includes everything: hardware, software, support, and maintenance. We manage the entire lifecycle of your cloud infrastructure, allowing you to focus on your core business. Try for Free Choose our automated private cloud and experience advanced, secure, and accessible technology. Try our services for free. For more information, visit our website NSAM Cloud.
United Kingdom, Dursley
Cyber security and cryptography courses and project work. Range of 1 and 2 day training courses, including Crypto courses, a Network Security course and a Blockchain course. Courses available for delivery at your site, or as an open scheduled course at various locations. Kryptosec was founded in 2001, and has worked with clients ranging from major banks and other financial institutions through to software development companies.
United Kingdom, London
AxioWorks is based in London, UK, and was founded by a group of IT professionals with many years experience in designing, developing, implementing, and managing enterprise IT systems.. We’re committed to building innovative but practical business software and helping developers and solution architects to maximise their use of Microsoft applications in their businesses. Our launch product...
United Kingdom, Milton Keynes
Wibu-Systems - Wibu-Systems is a leading provider of software and hardware security solutions for software protection and licensing, access protection, and document protection. The company has a leading position worldwide in innovation, technology and security, as well as solution variety - ranging from smartphones, embedded software, machine production data, PCs, servers to Cloud Computing. Additional solutions facilitate the creation, management and distribution of licenses and are easily integrated into existing distribution processes or ERP-Systems.
United Kingdom, London
... provides 4 types of services and products to its customers: 1- New SAP Project Implementations 2- SAP S/4HANA Transition Project Implementations 3- SAP add-on software in its R&D center 4- Application Management Service (AMS)By launching its certified R&D Center, MBIS also dedicated itself to develop unique SAP add-on solutions and methodologies: Personal Data Discovery, Encryption, Anonymization in SAP and non-SAP systems for GDPR compliance Real-time System Monitoring and Notification ABAP Code Optimizer SAP Field Based Authorization...
Popular countries for this search term

The europages app is here!

Use our improved supplier search or create inquiries on the go with the new europages app.

Download in the App Store

App StoreGoogle Play