This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
• Access to local resources when connecting from the intranet. • Access to resources in the cloud when connecting from the intranet. • Access to local resources when connecting from a branch office. • Access to resources in the cloud when connecting from a branch. • Access to resources from the public Internet while working remotely. • Access cloud resources from the public Internet while working remotely.
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relie... viac...
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...