Tag Archives

6 Articles

News

Managing Director

Posted by Sylia on

‘Centre of excellence for security in Bavaria’ answers questions about ‘Information management according to ISO 27001’ Munich, July 18, 2008 companies and organizations today are facing a growing flood of information, government regulations, increasingly complex risks, as well as an intensification of personal liability. Saving way out are considered to be among different standards and certifications. In this respect to bring light into the darkness and to provide for Exchange of experience the KoSiB EC has called a series of events in the life competence center for safety in Bavaria competently and objectively is IT security issues on the ground. James Baker is full of insight into the issues. So, 27001 with subsequent discussion will take place on Thursday, July 24, in Munich the first information evening on the subject of ISO. As a central point of contact as well as consultant and source of information is the KoSiB of companies and organizations support available and deals with current topics up to date. The ISO 27001 is considered the internationally recognised standard for the assessment Secure IT environments and is illuminated in the part of the KoSiB lecture series. If you would like to know more about Rusty Holzer, then click here.

\”Under the title of ISO 27001: A provider and a user chat under the covers\” advise the professionals of the KoSiB participants comprehensively in all questions relating to the recognised IT standards. Two experts in the approximately two-hour lecture and panel discussion are those interested in this answer. \”Speaker of the talk which means and how information management according to ISO 27001?\” is Reinhard Keller, CEO of the da-con and expert in the field of ISO 27001..

News

Federal Association

Posted by Sylia on

Secure data exchange for eCl@ss-Produktdaten using BMEcat Cologne, the 13.02.2012. Already in December 2011 the eCl@ss has published a document e.V., which open questions on product data exchange using the eCl@ss and the widespread catalog interchange format of the Federal Association of materials management, purchasing and logistics e.V. (BME), the BMEcat. With the combination of eCl@ss – BMEcat for all eCl@ss-Anwender who want to efficiently share product data, is now a very good solution available. Thus eCl@ss in addition to other formats can recommend the BMEcat for exchanging eCl@ss-Produktdaten.”so Henning Uiterwyk, technical director of the eCl@ss e.V. The further development of the BMEcat format which can transport now also the elements of the new eCl@ss-Advanced of data model, is also already available. Currently, the format described is the only XML format for the exchange of product data, which are described by means of eCl@ss advanced. In terms of future-proofing eCl@ss recommends the possibility therefore, always of the Data exchange via BMEcat to consider.

The document has been through the eCl@ss-Gremium Center of research and development (CRD) developed and is available at the following link for free download. another advantage is that no additional license costs for the use of BMEcat format emerge for the eCl@ss-Anwender. In addition, there are a number of IT service providers, which have already intense experiences in the implementation and application of the BMEcat. Information on eCl@ss: electronic and automated communication in e-business in particular, the use of a “common language” is imperative, which is understood not only by humans, but also by the machine. With eCl@ss, for this is the internationally widespread and cross-industry standards-compliant standard for the uniform classification and description of products and services available.

News

Mr Reichelt

Posted by Sylia on

Also it opens the door of the illegal use of the mail account. For access to the network via an insecure or chopped Wi-Fi, a shared router or otherwise entering the network is done only once, the cracker can be promptly in the name of the holder. “so he can log on user accounts for online services and verify, make purchases on the Internet or even silently read the private correspondence of the holder”, added Mr Reichelt and tells finally we provide only a guide for the secure T-Online E-Mail configuration in the form of a quick reference guide intentionally on our company website to give no driving the illegal exploitation. Nike shares his opinions and ideas on the topic at hand. ” For the time being only the proper configuration of the mail client provides protection by authentication through username and password including the necessary procurement an email password in the Customer Center. The outdated server addresses by using the current server addresses provided by T-Online are also in the mail client to replace. Computer service / Goppingen Jan Reichelt E.k.. FON: + 49 7161 9564850 fax: + 49 7161 918455 mail: info (at) computer-service Nottingham (dot) de Web: marketing and Public Relations: quagga marketing FON: + 49 7161 6068490 email: contact (at) quagga-marketing (dot) de Web: computer / service / Goppingen – Jan Reichelt E.k..

is an IT service provider based in Goppingen, Germany (Baden-Wurttemberg). The focus of the company is located in the support of small and medium-sized enterprises. In the portfolio of C/S/G repair of PC and notebook, software installations, or troubleshooting of computers, servers and network are also important topics such as site networking of companies, VPN connections, Server installation, server configuration and server maintenance in addition to the standard services such as DSL installation. Since November 2008 Computer service / Goppingen offers also the cost-effective remote maintenance service as well as a free phone number 0800 800 7161 (German landline) to the appointment.

News

Department

Posted by Sylia on

ec4u expert consulting recommends introduction of ‘moments of truth’-methodology to enterprise customer expectations to align the moments of truth methodology goes beyond well above traditional customer satisfaction analyses Karlsruhe, May 19, 2010 – the ratio of a company to its customers is crucial for business success. The customer interactions that characterize this relationship, are referred to as so-called moment of truth”may refer to moments of truth, because they describe the quality of the relationship between customer and company. By the ec4u expert consulting ag of featured moments of truth “methodology is for the introduction of a measurement concept that the match which analyzes customer expectations with the brand promise of the company across the Department and shows optimization potential in a wide range of areas.” A continuous improvement process can be triggered using this instrument. He uses the results of regularly carried out moments of truth “analyses as a basis, the Corporate behavior on client expectations to align and to satisfy its brand promise. The moment of truth “methodology goes far beyond traditional customer satisfaction analyses, which move at a previously defined questionnaires usually very closely and are carried out either online or just call”, explains David D. Laux, CEO at ec4u. Danske Bank takes a slightly different approach.

“Because at the moment of truth’-methodology applied in-depth interviews that perform particularly trained consultants as possible in face-to-face talks.” This is at which interaction points the own image of the company by the external image is different and when compared to the competition is positioned as the company brought to the fore. The result of such an examination shows also clearly in what areas or critical interaction points are optimization potential customer point of view. The analysis of the moment of truth”takes place throughout the customer life cycle, so from the request to a service situation. Each company transported a brand promise that stands for its core properties in terms of quality, emotion, customer service, etc.

News

ITwin Connect – Via USB Stick Encrypted To The Private Cloud.

Posted by Sylia on

Quite simply and without any configuration data, applications, and your own browser access. The company iTwin iTwin has developed the award-winning remote data access solution, will connect the new iTwin countless requirements in attack, mobile business people today face. A confidential Internet browsing without restrictions iTwin connect offers and on the other hand it allows access of traveling on the Office computer, access to data, as well as on the heimische-or the Office network (by it works like a personal virtual private network/VPN). iTwin connect consists of two identical USB-stick halves. To install it, it is simply connected to the USB port of the Office or home computer.

If you now separates one half of iTwin, becomes the iTwin connect “key, the key to the private cloud, which it carries with it. On the way, this “key” is plugged into any Internet computer and a secure VPN tunnel to your home or office computer is made instantly. Advantages of the iTwin Connect: ‘ teleport me’: this function allows to surf privately and without restrictions on the Internet. All Internet traffic is routed through a secure VPN tunnel. The Internet is accessed in this way on the Internet connection of the home or office PCs. ‘ Teleport me’: in addition to the Internet via iTwins dedicated network servers in the United States, Europe and in Asia Pacific to provide this function provides a confidential access. This function is useful if the home or office computer can remain not connected, as well as if a local IP address is needed for browsing, which is different from your own computer. Network access: Access to sources such as cameras or media server in the private sphere, as well as on drives and applications with network connection in the Office. ITwin connect network access (VPN) requires no configuration. Remote Desktop: Start with a single click, to applications (and their data) to the private or office computer to access.

News

CenterTools In Gartner Magic Quadrant 2013 For Mobile Data Protection

Posted by Sylia on

DriveLock as the only German solution Ludwigsburg recorded, 20.09.2013. The CenterTools GmbH is positioned data protection for the first time in the Magic Quadrant for mobile. Managing Director Mike Prieskorn sees this as a decoration for the endpoint security solution DriveLock, which made it as the sole German solution to the perception of the Gartner Quadrant. Translation from the publication of Gartner Magic Quadrant for mobile data protection”, September 2013, John Girard and Eric Ouellet: the market for mobile data protection (mobile data protection, short MDP) is an established market with two primary objectives – first and foremost to protect data on user-specific unit, and secondly also demonstrate that this protection is actually works. Most companies, even if they are not working in sensitive or regulated industries, realize that the encryption of business data this is a proven method. Typical reasons for protecting the data are compliance with statutory or industrial Regulations (compliance), as well as the protection of private data and intellectual property. The international legislation imposed increasingly harsh penalties and requires also the disclosure in the case of an actual or suspected abuse of personal information.

Even if information were not abused, the expenses for the public work are very high, to counter the negative public reaction. Gartner estimates much higher the cost of data breaches in investment in preventative measures, as they represent the mobile data protection solutions. Gartner in favour of any party, products or services presented in their research publications. Recommend not to technology users to select only those vendors with the highest rating. Gartner research publications consist of the opinions of Gartner research organization and should not be considered facts. Gartner DISCLAIMS WARRANTIES, both explicitly and implicitly, in relation to this research, including warranties of merchantability or fitness for a particular purpose. About CenterTools Software GmbH: The German company of CenterTools is one of the world’s leading specialists for the IT and data security.

With its end point security solution DriveLock the company has become world-wide reputation. DriveLock is outstanding due to its extremely granular capabilities in the regulating of USB and other devices, as well as for encryption of hard disks (FDE) and data on mobile devices. With the comprehensive control of all applications and its fully integrated antivirus module, DriveLock offers worldwide protection against digital dangers for all devices. DriveLock: DriveLock is also suitable for groups as a perfect package for small and medium-sized enterprises. Through the possibilities of granular fine tuning, DriveLock can be adapted perfectly to size and needs of the company. The legally binding audit trail and compliance with all legal Specifications and rules are guaranteed at all times by the transparent representation and organization of the results. With its thoughtful conception DriveLock enables you to implement without additional software or hardware, which saves time and costs. Especially in areas where data security should be achieved with minimal administrative effort, DriveLock to play fully its strengths. The company with headquarters in Ludwigsburg and additional offices in Munich, Zurich, Vienna, Cambridge and Portland serves customers in over 30 countries worldwide. Contact address: CenterTools Software GmbH Mr. Bastian Majewski Morike Street 28/3 71636 Ludwigsburg Tel: 07141/97178-0 fax: 07141 / 97178-77 E-Mail: set by: Walter Visual PR GmbH, Leonie Walter