Linoma Software

Results: 35



#Item
21Cyberwarfare / Computer security / Managed security service / Deep packet inspection / IBM Internet Security Systems / IBM / Internet security / Unified threat management / Linoma Software / Computer network security / Computing / Security

Delivers solutions for preventing malicious system threats and attacks to mid-sized companies Monitor Your IT Infrastructure to Prevent Malicious Threats

Add to Reading List

Source URL: www.chooses1.com

Language: English - Date: 2010-04-01 14:27:00
22Security information and event management / Audit / Computing / Linoma Software / Computer security / Data security / Security

NEWS For Immediate Release Enforcive releases Enforcive/Enterprise Security version 8 including allnew Compliance Assessment and IFS Auditing (Hackensack, New Jersey and Herzliyah, Israel- November 18, 2013) Enforcive, a

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2013-11-26 00:45:21
23National security / Mass surveillance / National Security Agency / United States government secrecy / Data security / Linoma Software / Vormetric / Security / Disk encryption / Cryptography

Microsoft Word - Field Encryption Press Release

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2013-10-10 00:00:01
24Managed file transfer / Information technology management / Enterprise application integration / IBM WebSphere / Proginet / Linoma Software / Computing / FTP / Files

“ “Because of the application integration capabilities and multi-tenancy support provided by MessageWay, the State of Michigan Data Exchange Gateway can deliver services to each of our agencies that are specifically

Add to Reading List

Source URL: www.ipswitchft.com

Language: English - Date: 2013-12-09 11:54:36
25Cryptographic protocols / Information / Secure Shell / AS2 / Cryptographic software / Electronic data interchange / Pretty Good Privacy / Linoma Software / Computing / Internet standards / Data

USPS Data Transfer Services Secure Protocol Options Communications Method EDI/INT AS2 (preferred solution) The "Internet Engineering Task Force Working Group for

Add to Reading List

Source URL: ribbs.usps.gov

Language: English - Date: 2014-05-07 14:47:44
26Distributed computing / Cryptography / Data security / Heartland Payment Systems / Cloud computing / Tokenization / Data center / Vormetric / Linoma Software / Computing / Data management / Concurrent computing

Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

Add to Reading List

Source URL: www.prianto.com

Language: English - Date: 2013-03-08 10:05:06
27Computer network security / Secure communication / Crime prevention / National security / Application firewall / Linoma Software / Fortinet / Vulnerability / Security management / Security / Computer security / Cyberwarfare

SPRING[removed]Friday, June 4, 2010 SCC Continuing Education Center 301 S. 68th St. Place Lincoln, NE

Add to Reading List

Source URL: cio.nebraska.gov

Language: English - Date: 2010-04-29 16:36:12
28Computing / Microsoft Dynamics CRM / Microsoft Dynamics / Client Access License / Royalties / Independent software vendor / Volume license key / Microsoft Software Licensing and Protection Services / Linoma Software / Software licenses / Microsoft / Software

Program Guide to the Microsoft Independent Software Vendor Royalty License and Distribution Agreement[removed]

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-03-04 19:30:59
29Computer network security / Secure communication / Crime prevention / National security / Application firewall / Linoma Software / Fortinet / Vulnerability / Security management / Security / Computer security / Cyberwarfare

SPRING[removed]Friday, June 4, 2010 SCC Continuing Education Center 301 S. 68th St. Place Lincoln, NE

Add to Reading List

Source URL: www.cio.nebraska.gov

Language: English - Date: 2010-04-29 16:36:12
30Data security / Data management / Database activity monitoring / File system / Relational database management systems / Security information and event management / Database / Vormetric / Linoma Software / Software / Computing / Database management systems

Monitoring Unstructured Data

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:12
UPDATE