Datakey Bilişim Blog

Datakey Bilişim Ltd. Şti.

İçeriğe geç
  • Başlangıç
  • Teknik Yazılar
    • Genel
    • Acronis
    • Ares Commander
    • Kaspersky
    • Forcepoint
    • Fortigate
    • Sophos
    • Trend Micro
  • Download’s
  • Hakkımızda
  • İletişim

Safetica Fiyat

Safetica Veri Sınıflandırma Yazılımları ile Entegre Çalışır.

31 Ocak 201931 Ocak 2019Enver ÇOLAKOĞLU

Üçüncü taraf veri sınıflandırma yazılımları: Safetica‘nın Microsoft Office belgelerinin özelliklerini, belgeye başka bir yazılım tarafından uygulanan bir veri sınıflandırması için arama yapmasını sağlar. Desteklenen... Devamını Oku...

Genel DLP Programı, Safetica destek, Safetica Fiyat, Veri koruma

Safetica 8 ile Gelen Geliştirmeler ve Yeni Özellikler! – 3 Tıklamayla DLP

24 Mayıs 201818 Haziran 2018Enver ÇOLAKOĞLU

Safetica 8.0 ile zamanınızı boşa harcamayın! Safetica 8 ile Gelen Geliştirmeler ve Yeni Özellikler! – 3 Tıklamayla DLP Yeni Kanal Kontrol modülüyle 3 tıklamayla DLP Geçmişte, hassas verileri etiketlememiz ve onları korumak için... Devamını Oku...

Genel safatica destek, Safetica Fiyat, safetica satış, Safetica türkiye

Microsoft Active Directory’yi Safetica’ya Aktarma İşlemi

9 Nisan 20189 Nisan 2018Enver ÇOLAKOĞLU

Bu işlemdeki amacımız Safetica ile Microsoft Active Directory senkronizasyonunu sağlamaktır. Bu sayede; Microsoft Active Directory kullanıcıları ve aygıtları ile sync olabileceğiz. Microsoft Active Directory OU (Organization Unit) içindeki... Devamını Oku...

Genel Safetica Active Directory, Safetica ayarlar, Safetica destek, Safetica Fiyat

Safetica 7.5 Yeni Özellikler

3 Nisan 201818 Haziran 2018Enver ÇOLAKOĞLU

En Hassas verilerin korunmasının karmaşık ve zaman alıcı olması gerektiğini kim söylüyor? Safetica olarak, kaliteli veri korumasının uygun maliyetli ve ek BT ​​yönetimi veya operasyonlarda aksaklık olmaması gerektiğine... Devamını Oku...

Genel DLP Programı, safetica dlp, Safetica Fiyat, safetica nedir, Safetica türkiye, site engelleme, web engelleme

Safetica DLP – Veri Sızıntısı Koruma Yazılımı

26 Ocak 201826 Ocak 2018Enver ÇOLAKOĞLU

Safetica Auditor Şirketinizdeki güvenlik risklerini belirleyin Safetica DLP Hassas verilerinizi veri sızıntısına karşı koruyun Safetica DLP + Safetica Mobile Bilgisayarları, dizüstü bilgisayarları ve telefonları koruyun Veri... Devamını Oku...

Genel DLP, Dlp Nedir, Safetica, Safetica Fiyat, Şirket bilgi güvenliği, Veri Sızıntısı Koruma Yazılımı

Datakey Site Statistics

  • Users online: 0 
  • Visitors today : 24
  • Page views today : 68
  • Total visitors : 46,147
  • Total page view: 65,583




Sizce En İyi DLP Programı Hangisi?

Sonuçları görüntüle

Yükleniyor ... Yükleniyor ...
  • Anket Arşivi

Sizce En İyi Antivirüs Çözümü Nedir?

Sonuçları görüntüle

Yükleniyor ... Yükleniyor ...
  • Anket Arşivi

RSS Kaspersky LAB

  • APT review: what the world’s threat actors got up to in 2019 4 Aralık 2019
    What were the most interesting developments in terms of APT activity during the year and what can we learn from them?
    David Emm
  • Corporate security prediction 2020 3 Aralık 2019
    The popularity of cloud services is growing, and threat actors are here to exploit the trend.
    Petr Mareichev
  • Cybersecurity of connected healthcare 2020: Overview and predictions 3 Aralık 2019
    More than two years after the infamous Wannacry ransomware crippled medical facilities and other organizations worldwide, the healthcare sector seems to be learning its lesson, as the number of attacked medical devices in 2019 decreased globally.
    Yury Namestnikov
  • Cyberthreats to financial institutions 2020: Overview and predictions 3 Aralık 2019
    Short overview of year's key events, analysis of forecasts for 2019 and our predictions about cyberthreats to financial institutions in 2020
    Yury Namestnikov
  • 5G technology predictions 2020 3 Aralık 2019
    With the dramatic increase in the amount and transfer speed of connected devices, comes natural expansion and amplification of the threats. The evolution, development, and connectivity of numerous systems within 5G opens the door for numerous threats.
    Mohamad Amin Hasbini

RSS TrendMicro

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign 4 Aralık 2019
    Trend Micro In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws. During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making […]
  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign 4 Aralık 2019
    Trend Micro In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws. During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making […]
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack 2 Aralık 2019
    Ecular Xu (Mobile Threat Response Engineer) We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which exhibit many cyberespionage behaviors, are initially used for a targeted attack campaign. We first came across the threat in May on the site http://gooogle.press/, which was advertising a chat […]
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack 2 Aralık 2019
    Ecular Xu (Mobile Threat Response Engineer) We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which exhibit many cyberespionage behaviors, are initially used for a targeted attack campaign. We first came across the threat in May on the site http://gooogle.press/, which was advertising a chat […]
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack 2 Aralık 2019
    Ecular Xu (Mobile Threat Response Engineer) We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which exhibit many cyberespionage behaviors, are initially used for a targeted attack campaign. We first came across the threat in May on the site http://gooogle.press/, which was advertising a chat […]

RSS MailStore ChangeLog

  • MailStore Server 12.0.5 14 Kasım 2019
    Improved Error handling in DATEV EMA migration profile: Timeout exception handling.
  • MailStore Server 12.0.4 18 Eylül 2019
    Improved Error handling in DATEV EMA migration profile.
  • MailStore Server 12.0.3 26 Haziran 2019
    Fixed Outlook Add-in: Empty error message dialogs. Fixed SMTP sessions are not terminated with QUIT command when sending emails to external systems. Fixed Some buttons in the MailStore Server Service Configuration Tool are too small to display the whole label in some languages. Fixed GPO for client does not apply correct language if value is […]
  • MailStore Server 12.0.2 8 Mayıs 2019
    Fixed Missing translations of new texts in version 12 if selected language is other than German or English.
  • MailStore Server 12.0.1 24 Nisan 2019
    Fixed G Suite IMAP login fails due to failed token revocation. Fixed Client: Clicking hyperlinks inside the email preview opens "about:blank#". Fixed Archiving emails from MailStore Gateway mailbox fails when the POP3 user name in a proxy scenario is not lower case only.

RSS Son Etkin Virüsler

  • Troj/MSILIn-GK 6 Aralık 2019
  • Troj/Phish-GNX 6 Aralık 2019
  • Troj/NanoCo-ADS 6 Aralık 2019
  • Troj/RTFDl-AZJ 6 Aralık 2019
  • Troj/Rebhip-BV 6 Aralık 2019
  • Troj/Steal-AL 6 Aralık 2019
  • Troj/Steal-AM 6 Aralık 2019
  • Troj/TrikBot-FB 6 Aralık 2019
  • Troj/Zbot-NYE 6 Aralık 2019
  • Troj/Zbot-NYW 6 Aralık 2019

RSS Google Security Blog

  • An Update on Android TLS Adoption 3 Aralık 2019
    Posted by Bram Bonné, Senior Software Engineer, Android Platform Security & Chad Brubaker, Staff Software Engineer, Android Platform Security Android is committed to keeping users, their devices, and their data safe. One of the ways that we keep data safe is by protecting network traffic that enters or leaves an Android device with Transport Layer […]
    Scott Westover
  • Expanding the Android Security Rewards Program 21 Kasım 2019
    Posted by Jessica Lin, Android Security TeamThe Android Security Rewards (ASR) program was created in 2015 to reward researchers who find and report security issues to help keep the Android ecosystem safe. Over the past 4 years, we have awarded over 1,800 reports, and paid out over four million dollars. Today, we’re expanding the program […]
    Scott Westover
  • Using a built-in FIDO authenticator on latest-generation Chromebooks 19 Kasım 2019
    Posted by Christiaan Brand, Product Manager, Google Cloud We previously announced that starting with Chrome 76, most latest-generation Chromebooks gained the option to enable a built-in FIDO authenticator backed by hardware-based Titan security. For supported services (e.g. G Suite, Google Cloud Platform), enterprise administrators can now allow end users to use the power button on these […]
    Sarah O'Rourke
  • GWP-ASan: Sampling heap memory error detection in-the-wild 7 Kasım 2019
    Posted by Vlad Tsyrklevich, Dynamic Tools TeamMemory safety errors, like use-after-frees and out-of-bounds reads/writes, are a leading source of vulnerabilities in C/C++ applications. Despite investments in preventing and detecting these errors in Chrome, over 60% of high severity vulnerabilities in Chrome are memory safety errors. Some memory safety errors don’t lead to security vulnerabilities but […]
    Scott Westover
  • The App Defense Alliance: Bringing the security industry together to fight bad apps 6 Kasım 2019
    Posted by Dave Kleidermacher, VP, Android Security & Privacy Fighting against bad actors in the ecosystem is a top priority for Google, but we know there are others doing great work to find and protect against attacks. Our research partners in the mobile security world have built successful teams and technology, helping us in the […]
    Scott Westover

RSS Sophos Security Blog

  • ¿El cifrado hace que el firewall sea irrelevante? 5 Aralık 2019
    Transport Layer Security (TLS) es el estándar de cifrado que se usa hoy en Internet: los términos SSL y TLS a menudo se usan indistintamente, pero Secure Sockets Layer (SSL) es un estándar antiguo que ha sido eclipsado por TLS. Entonces, aunque el término más común sigue siendo SSL, solo debe saber que la mayoría […]
    Naked Security
  • El tío Sam abre los brazos a hackers amigables 4 Aralık 2019
    Todos los cazadores de vulnerabilidades están a punto de recibir un bonito regalo de Navidad: el gobierno federal de EEUU finalmente quiere su información. Los sitios web y los departamentos de ciberseguridad poco útiles pronto serán cosa del pasado, gracias a un nuevo reglamento de la Agencia de Ciberseguridad e Infraestructura (CISA). La Agencia, que […]
    Naked Security
  • Magento Marketplace de Adobe sufre una filtración de datos 3 Aralık 2019
    Magento Marketplace de Adobe ha sufrido una filtración de datos, comunicó la empresa en un correo electrónico enviado a sus clientes. Magento Marketplace es donde los 250.000 clientes del sistema de administración de contenido de comercio electrónico Magento pueden acceder a complementos de software que incluyen extensiones, temas y servicios de terceros. La empresa no […]
    Naked Security
  • Rusia prohibirá la venta de dispositivos que no incorporen software ruso 29 Kasım 2019
    La campaña del gobierno ruso para controlar cómo sus ciudadanos usan Internet parece estar cobrando fuerza. A principios de este mes, el país aprobó una nueva y controvertida ley de “internet soberano” que requiere que los ISP del país establezcan una inspección profunda de todos los paquetes del tráfico de internet y se preparen para […]
    Naked Security
  • El 90% de las empresas que ha sufrido un ciberataque contaba con soluciones tradicionales de seguridad 28 Kasım 2019
    Sophos (LSE: SOPH) líder global en seguridad para protección de redes y endpoints, celebró el pasado 26 de noviembre el Sophos Day 2019 en el Museo Reina Sofía de Madrid, donde se dieron cita casi 500 profesionales del sector de ciberseguridad para conocer cuál es el panorama de ciberamenazas actual y las últimas innovaciones llevadas […]
    Sophos Iberia

RSS Force Point

  • Context is Key: Forcepoint’s first annual cybersecurity leadership breakfast in Canada 25 Kasım 2019
    In November 2019, Forcepoint was joined by government and industry cybersecurity practitioners in Ottawa to discuss the most pressing challenges in cybersecurity for Canadian government agencies.
    Kristina Dettwiler
  • 2020 Forcepoint Cybersecurity Predictions and Trends 19 Kasım 2019
    Every year Forcepoint asks our cybersecurity researchers, engineers and strategists to predict what they believe will impact the cybersecurity landscape during the next 12 months. Historically we have been consistently accurate.  Do you agree with our predictions for 2020?
    Carl Leonard
  • Is security keeping up with innovation? 18 Kasım 2019
    Join Forcepoint at AWS re:Invent this December where we will be discussing strategies to ensure your security keeps pace with your innovation.
    Jill Bradshaw
  • The persuasiveness of a remote job 12 Kasım 2019
    Advances in technology can be witnessed on different levels in our everyday life. Internet connected devices help us in virtually every aspect of the daily routine, providing tools and information on just about any subject that one can think of. Increasingly it is no longer necessary to commute to an office to fulfil a job […]
    Robert Neumann
  • Military cyber leaders to discuss cyber resilience and digital modernization in Hawaii 8 Kasım 2019
    This November, two key events will be taking place at the Hilton Hawaii Village in Honolulu: the TechNet Indo-Pacific and the Coalition Interoperability Forum. Leaders from government and cyber will converge to address the most pressing challenges facing the military and how to accelerate digital modernization to remain ahead of cyber adversaries.
    Kristina Dettwiler
  • Every Other Company Assumes that Insider Threat Has Already Happened 6 Kasım 2019
    Insights into German IT experts’ views on cybersecurity - survey
    Forcepoint
  • ‘Doctor Zero Trust’ shares advice for modern cybersecurity programs 24 Ekim 2019
    In Forcepoint’s latest To the Point Cybersecurity podcast episode, Chase Cunningham (aka Dr. Zero Trust), Principle Analyst at Forrester Research, joined as a guest to offer his advice and outlook on the market trends
    Jill Bradshaw
  • Raise The Bar: One year later, where are we now? 22 Ekim 2019
    On December 21, 2018 the National Security Agency (NSA) and National Cross Domain Strategy Management Office (NCDSMO) released the official Raise the bar (RTB) guidelines. The initiative offers strategies for architecture design improvement and sets requirements to considerably improve cross domain solution (CDS) security and capabilities to stay ahead of the adversary. So, one year […]
    Carolyn Ford
  • Black Swans and Coconuts: Managing Digital Risk in Today’s Enterprises 18 Ekim 2019
    In October 2019 Forcepoint hosted a Digital Risk workshop at the recently-opened US Embassy in London, gathering together a strong group of presenters and audience of customers to debate the issues facing security leadership today.
    Duncan Brown
  • Exploring SaaS security best practices 16 Ekim 2019
    Robert Lesieur

RSS Fortinet

  • Dissecting Tor Bridges and Pluggable Transport – Part II: How Obfs4 Bridges Defeats Censorship 6 Aralık 2019
    In part two of this series on dissecting tor bridges and pluggable transport, our FortiGuard Labs researcher explores how Tor uses Obfs4 Bridge to circumvent censorship. Learn more.
  • Dissecting Tor Bridges and Pluggable Transport - Part I: Finding the Built-in Tor Bridges and How Tor Browser Works 5 Aralık 2019
    Learn more about how our FortiGuard Labs researchers discovered built-in Tor bridges using reverse engineering.
  • FortiGuard Labs Weekly Threat Update – November 22, 2019 22 Kasım 2019
    Learn about the cyber threats uncovered during the week of November 22, 2019.
  • New Spam Campaign Impersonates a Variety of Government Agencies from Different Countries 21 Kasım 2019
    Learn more about a recent spam campaign that has been targeting IT services, manufacturing, and healthcare organizations by impersonating a number of government agencies from a variety of countries.
  • New Threat Predictions for 2020 20 Kasım 2019
    Learn more about how to prepare for future cyberattacks by exploring upcoming threat landscape predictions for 2020.
  • Packers: What’s in the Box? 19 Kasım 2019
    Learn more about a new custom packer tool dubbed "Frenchy," which was recently discovered by the FortiGuard SE team.
  • FortiGuard Labs Weekly Threat Update – November 15, 2019 15 Kasım 2019
    Learn about the cyber threats uncovered during the week of November 15, 2019.
  • Fortinet Security Researchers Discover Multiple Vulnerabilities in Adobe and Cisco Products 15 Kasım 2019
    Our Fortinet security researchers discovered multiple vulnerabilities in Adobe and Cisco products, all of which have since been patched. Learn more.
  • Double Trouble: RevengeRAT and WSHRAT 13 Kasım 2019
    Learn more about a new Revenge RAT sample recently captured in the wild by our FortiGuard Labs team.
  • New Emotet Report Details Threats From One of the World’s Most Successful Malware Operations 13 Kasım 2019
    FortiGuard Labs has released a new Adversary Playbook, which provides valuable information for detecting, understanding, and addressing recent iterations of Emotent. Learn more.

Son Yazılar

  • Kaspersky Sandbox Gelişmiş Tehditlere Karşı Otomatik Koruma Özelliği
  • Dijital Dönüşüm Çağında Veri Koruma – DLP
  • Hareket Halindeki Veriler Nasıl Korunur? CosoSys Endpoint Protector
  • Acronis Backup PE Media Oluşturma
  • Acronis Backup 12.5 Linux Kurulumu
  • Useroam Hotspot yazılımının Kurulumu Ve Cyberoam- Sophos Firewall için Ayarları
  • GFI FaxMaker Toplu Fax Gönderme – E-Mail İle Fax Gönderme – E-Mail Toplu Fax
  • Kurumsal Segmentte Fidye Yazılımlarına Karşı Koruma
  • Acronis True Image PC Yedekleme
  • Acronis Backup 12.5 U4 Kurulum ve Konfigürasyon – Türkçe

Kategoriler

  • Acronis
  • Ares Commander
  • Forcepoint
  • Fortigate
  • Genel
  • Kaspersky
  • Sophos
  • Trend Micro

Etiketler

Acronis Backup Acronis Destek Acronis Snap Deploy Acronis Yedekleme alternatif AutoCAD ARES 3'lü CAD ARESCAD ARES CAD arescad fiyat AresCAD Türkiye Ares Commander Ares Commander fiyat ARES Commander Türkiye ARES fiyat Ares Kudo ARES türkiye AutoCAD CAD CAD programı DLP DLP Programı DWG DWG Düzenleme en iyi cad programı Exchange Backup GFI Türkiye Graebert Kasperksy Destek Kaspersky Destek Mail Arşivleme mail backup MailStore destek MailStore fiyat mailstore türkiye Mail Yedekleme mail yedekleme programı Online CAD Safetica destek Safetica Fiyat Safetica türkiye Sophos fiyat sophos kurulum Trend Micro Trend Micro Antivirus Veri koruma
Gururla sunan WordPress | Tema: ThemeGrill tarafından Radiate.