Your search results for

257 results:
131.DCP-Eval-Guide.pdf Evaluating Data-centric Protection Solutions A Guide for Enterprise Architects and CISOs Henning Horst, Mark Bower Contents About this Document… 
132.FS_comforte_company_overview.pdf cf_Company_overview_10_18_PRINT.qxp_Layout 1 25.10.18 16:41 Seite 1 cf_Company_overview_10_18_PRINT.qxp_Layout 1 25.10.18 16:41 Seite 2 cf_Company_overview_10_18_PRINT.qxp_Layout 1 25.10.18 16:41… 
133.AccountExecutive_EMEA.pdf comforte AG Abraham-Lincoln-Straße 22 65189 Wiesbaden Join us as an Account Executive EMEA Job Overview Job Title: Company: Job Location: Contract type: Experience: Tags: Education: Reports To:… 
134.comforte_SecurLib-SSL_data_sheet_2019_Esp_rev_PRINT.pdf comforte_SecurLib-SSL_data_sheet_2019_Esp_rev.qxp_Layout 1 29.11.19 04:28 Seite 1 SecurLib/SSL SecurLib/SSL – Integre fácilmente las operaciones criptográficas SSL estándar en sus aplicaciones … 
135.FS_SecurLib-SSL.pdf comforte_SecurLib-SSL_data_sheet_2020.qxp_Layout 1 28.03.20 16:37 Seite 1 SecurLib/SSL SecurLib/SSL – Easily integrate standard SSL cryptographic operations into your applications Various security… 
136.FS_SecurFTP_SSH.pdf comforte_SecurFTP_SSH_Data_Sheet_03/2020.qxp_Layout 1 28.03.20 16:53 Seite 1 SecurFTP/SSH File transfer using the SFTP/SSH standard Today many organizations exchanging data between computer systems… 
137.FS_MRWin6530.pdf comforte_MRWin6530_Data_sheet_11/2017.qxp_Layout 1 29.10.17 18:44 Seite 1 MR-Win6530 The Standard in HPE NonStop Emulation MR-Win6530 is a terminal emulation package that provides Microsoft Windows… 
138.Human_Resources_Generalist.pdf comforte AG Abraham-Lincoln-Straße 22 65189 Wiesbaden Join us as a Human Resources Generalist (m/f/d) Job Overview Job Title: Company: Job Location: Contract type: Experience: Tags: Education:… 
139.Whitepaper: Securing Big Data Analytics: On-premises, in the Cloud, or Both - How to Find the Right Strategy The insights gained from Big Data Analytics are incredibly valuable, however every new data stream constitutes a new potential attack vector, which makes classic perimeter defenses obsolete and can… 
140.eBook_Data_Protection_Methods_Explained.pdf Data-centric protection explained: Weighing the different protection methods Data-centric protection explained: Weighing the different protection methods 3 Intro 4 Data-Centric Security 5 How… 
Search results 131 until 140 of 257