IT-Security: Die Rolle von Cybersecurity in einem modernen Unternehmen.
30 März 2022 3:25 pm | | Tags: Cloud Security, Data Security, Security, Security
Interview mit Nikola Dinic Wir sprechen mit Nikola Dinic, Chief Information Security Officer der ITSDONE Group und CONVOTIS, über... Weiterlesen
IT-Security: Ist Ihr Unternehmen gewappnet?
27 Jänner 2022 2:19 pm | | Tags: Cloud Security, Data Security, Internet security, Internet security, Internet security, Security
Interview mit Ing. Stefan Fischer Wir sprechen mit Ing. Stefan Fischer, Geschäftsführer der ITSDONE Holding und Services GmbH, über die... Weiterlesen
To Yammer or not to Yammer
14 Juni 2021 4:04 pm | | Tags: MS Yammer
To Yammer or not to yammer, that is the question Some of us have spent a lot of time trying... Weiterlesen
Artikel suchen
#
- Active Directory
- aftercorona
- Automatic Dependency Management
- Automation
- AVD
- Azure
- azure AD
- Azure Virtual Desktop
- Backup in the Cloud
- Backup Solutions
- Brownfield
- Business Continuity
- Business Intelligence
- Business Voice
- C#
- Cloud
- Cloud Backup
- cloud governance
- Cloud governance workshop
- cloud migration
- Cloud Security
- Cloud Services
- Collaboration
- Collaborative Work
- Compliance
- Compliance Manager
- Connectivity
- convotis
- COVID19
- darktrace
- Data Security
- Datentransfer
- Dell Gold Partner
- DELL Wyse
- digitalised management processes
- DSGVO
- Endpoint Protection
- FluentD
- Fortinet
- GitLab
- Governance
- Grafana
- Greenfield
- HANA Competence
- Hybrid Cloud
- Hybrid Events
- Hybrid Work
- IIOT
- Incident Readiness
- Incident Response
- Infrastructure-as-a-service
- Internet security
- IT automation
- IT consultants
- IT Infrastructure
- IT process
- IT-Services
- IT/OT
- itsdone
- ITSDONE News
- ITSDONE Talk
- LDAP
- livebesichtigung
- Logging
- Loki
- Machine Learning
- Managed IT
- Microsoft
- Microsoft Information Protection
- Microsoft Surface
- Microsoft Teams Rooms
- Microsoft To Do
- Microsoft VIVA
- Modern Workplace
- MS Teams
- MS Yammer
- NAC
- Network access control
- New Way of Working
- Office365
- On-premise
- Phishing Email
- Power Automate
- Power BI
- privileged identity management
- Prozessoptimierung
- Ranking
- Realtime Computing
- Recovery Plan
- Remote Meeting
- Remote Work
- Retention Policy
- S/4HANA
- S4HANA Conversion
- SAP
- SAP Landscape Management
- SAP on Azure
- SAP Wartungsende
- Security
- Security Operation Center
- Skype for Business
- Syslog
- Thin Client
- Threat Research
- TOP-Partner
- UiPath
- Windows Virtual Desktop
- WVD