ºÝºÝߣshows by User: YvesVanTongerloo / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: YvesVanTongerloo / Thu, 29 Sep 2016 15:07:31 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: YvesVanTongerloo GDPR infographic /slideshow/gdpr-infographic-66563082/66563082 gdprinfographic-160929150731
BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST BE COMPLIANT WITH THE REQUIREMENTS STATED IN THE GDPR.]]>

BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST BE COMPLIANT WITH THE REQUIREMENTS STATED IN THE GDPR.]]>
Thu, 29 Sep 2016 15:07:31 GMT /slideshow/gdpr-infographic-66563082/66563082 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) GDPR infographic YvesVanTongerloo BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST BE COMPLIANT WITH THE REQUIREMENTS STATED IN THE GDPR. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gdprinfographic-160929150731-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST BE COMPLIANT WITH THE REQUIREMENTS STATED IN THE GDPR.
GDPR infographic from Sectricity
]]>
1158 3 https://cdn.slidesharecdn.com/ss_thumbnails/gdprinfographic-160929150731-thumbnail.jpg?width=120&height=120&fit=bounds infographic 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How Balabit helps to comply with iso 27001 (infographics) /slideshow/how-balabit-helps-to-comply-with-iso-27001-infographics-50133924/50133924 howbalabithelpstocomplywithiso27001-infographics-150703125503-lva1-app6892
]]>

]]>
Fri, 03 Jul 2015 12:55:03 GMT /slideshow/how-balabit-helps-to-comply-with-iso-27001-infographics-50133924/50133924 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) How Balabit helps to comply with iso 27001 (infographics) YvesVanTongerloo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howbalabithelpstocomplywithiso27001-infographics-150703125503-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
How Balabit helps to comply with iso 27001 (infographics) from Sectricity
]]>
729 5 https://cdn.slidesharecdn.com/ss_thumbnails/howbalabithelpstocomplywithiso27001-infographics-150703125503-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds infographic 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BalaBit 2015: Control Your IT Staff /YvesVanTongerloo/balabit-2015-monitoring-your-privileged balabit-intro2015-150512100652-lva1-app6891
Privileged Activity Monitoring Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from clients and servers - integrating seamlessly into existing infrastructures.]]>

Privileged Activity Monitoring Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from clients and servers - integrating seamlessly into existing infrastructures.]]>
Tue, 12 May 2015 10:06:52 GMT /YvesVanTongerloo/balabit-2015-monitoring-your-privileged YvesVanTongerloo@slideshare.net(YvesVanTongerloo) BalaBit 2015: Control Your IT Staff YvesVanTongerloo Privileged Activity Monitoring Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from clients and servers - integrating seamlessly into existing infrastructures. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balabit-intro2015-150512100652-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Privileged Activity Monitoring Shell Control Box is an activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise tool with the widest protocol coverage on the market. It is completely independent from clients and servers - integrating seamlessly into existing infrastructures.
BalaBit 2015: Control Your IT Staff from Sectricity
]]>
878 2 https://cdn.slidesharecdn.com/ss_thumbnails/balabit-intro2015-150512100652-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SafeNet overview 2014 /slideshow/safenet-overview-2014/41845554 safenetoverview-2014-141121032749-conversion-gate02
SafeNet is trusted to protect, control access to, and manage the worlds most sensitive data. SafeNet has 2 core activities: Strong authentication (2FA) and Data Encryption & Crypto Management because DATA IS THE NEW PERIMETER!]]>

SafeNet is trusted to protect, control access to, and manage the worlds most sensitive data. SafeNet has 2 core activities: Strong authentication (2FA) and Data Encryption & Crypto Management because DATA IS THE NEW PERIMETER!]]>
Fri, 21 Nov 2014 03:27:49 GMT /slideshow/safenet-overview-2014/41845554 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) SafeNet overview 2014 YvesVanTongerloo SafeNet is trusted to protect, control access to, and manage the worlds most sensitive data. SafeNet has 2 core activities: Strong authentication (2FA) and Data Encryption & Crypto Management because DATA IS THE NEW PERIMETER! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/safenetoverview-2014-141121032749-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SafeNet is trusted to protect, control access to, and manage the worlds most sensitive data. SafeNet has 2 core activities: Strong authentication (2FA) and Data Encryption &amp; Crypto Management because DATA IS THE NEW PERIMETER!
SafeNet overview 2014 from Sectricity
]]>
2026 2 https://cdn.slidesharecdn.com/ss_thumbnails/safenetoverview-2014-141121032749-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bright talk mapping the right aut solution for you 2014 final (1) /slideshow/bright-talk-mapping-the-right-aut-solution-for-you-2014-final-1/36585347 brighttalkmappingtherightautsolutionforyou2014final1-140703041644-phpapp01
]]>

]]>
Thu, 03 Jul 2014 04:16:43 GMT /slideshow/bright-talk-mapping-the-right-aut-solution-for-you-2014-final-1/36585347 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) Bright talk mapping the right aut solution for you 2014 final (1) YvesVanTongerloo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/brighttalkmappingtherightautsolutionforyou2014final1-140703041644-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Bright talk mapping the right aut solution for you 2014 final (1) from Sectricity
]]>
795 6 https://cdn.slidesharecdn.com/ss_thumbnails/brighttalkmappingtherightautsolutionforyou2014final1-140703041644-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Secure laptop - intro BXL /slideshow/the-secure-laptop-intro-bxl-32317823/32317823 securelaptop-140314100045-phpapp02
Securing the laptop with SafeNet & Sophos With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement. Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field.]]>

Securing the laptop with SafeNet & Sophos With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement. Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field.]]>
Fri, 14 Mar 2014 10:00:45 GMT /slideshow/the-secure-laptop-intro-bxl-32317823/32317823 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) The Secure laptop - intro BXL YvesVanTongerloo Securing the laptop with SafeNet & Sophos With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement. Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securelaptop-140314100045-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Securing the laptop with SafeNet &amp; Sophos With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement. Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field.
The Secure laptop - intro BXL from Sectricity
]]>
764 4 https://cdn.slidesharecdn.com/ss_thumbnails/securelaptop-140314100045-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SafeNet Enterprise Key and Crypto Management /slideshow/safenet-enterprise-key-and-crypto-management/24936695 safenetenterprisekeyandcryptomanagement-130805073913-phpapp02
With SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise. SafeNet's data center protection solutions are designed to secure all of the sensitive information that is stored in and accessed from enterprise data centers, including patient records, credit card information, social security numbers, and more. ]]>

With SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise. SafeNet's data center protection solutions are designed to secure all of the sensitive information that is stored in and accessed from enterprise data centers, including patient records, credit card information, social security numbers, and more. ]]>
Mon, 05 Aug 2013 07:39:13 GMT /slideshow/safenet-enterprise-key-and-crypto-management/24936695 YvesVanTongerloo@slideshare.net(YvesVanTongerloo) SafeNet Enterprise Key and Crypto Management YvesVanTongerloo With SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise. SafeNet's data center protection solutions are designed to secure all of the sensitive information that is stored in and accessed from enterprise data centers, including patient records, credit card information, social security numbers, and more. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/safenetenterprisekeyandcryptomanagement-130805073913-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise. SafeNet&#39;s data center protection solutions are designed to secure all of the sensitive information that is stored in and accessed from enterprise data centers, including patient records, credit card information, social security numbers, and more.
SafeNet Enterprise Key and Crypto Management from Sectricity
]]>
3386 3 https://cdn.slidesharecdn.com/ss_thumbnails/safenetenterprisekeyandcryptomanagement-130805073913-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-YvesVanTongerloo-48x48.jpg?cb=1553983738 Hacking, Phishing and Security Awareness. That is the passion of Sectricity! With more than 50 years of experience in IT security, we guide all companies in the Benelux that want to take a preventive battle against cybercrime. Hackers do not distinguish between international companies and SMEs, and neither do we. Personalized contact, tailor-made approach and transparent prices. That is promised! WE CONTINUE WHERE OTHERS STOP * Flemish SMEs can use the SME portfolio to save on training (up to 40%) Contact us: info@sectricity.com www.sectricity.com https://cdn.slidesharecdn.com/ss_thumbnails/gdprinfographic-160929150731-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/gdpr-infographic-66563082/66563082 GDPR infographic https://cdn.slidesharecdn.com/ss_thumbnails/howbalabithelpstocomplywithiso27001-infographics-150703125503-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-balabit-helps-to-comply-with-iso-27001-infographics-50133924/50133924 How Balabit helps to c... https://cdn.slidesharecdn.com/ss_thumbnails/balabit-intro2015-150512100652-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds YvesVanTongerloo/balabit-2015-monitoring-your-privileged BalaBit 2015: Control ...