jeffreyappel.nl | Azure AD Azure AD Identity Protection Defender for Cloud Defender for Cloud Apps Defender for Endpoint Defender for Identity Intune MDE Series Microsoft Sentinel | defender endpoint, endpoint deployment, endpoint linux, endpoint ios, endpoint mde | january, attack, xdr, min, disruption | 27 |
talkingsecurity.nl | An episode of Talking Security about Microsoft Defender for Endpoint - Evaluation Labs. I have introduced this new series of recordings for you to gain more insight into the Microsoft Defender for Endpoint product. This is the fourth part… | defender endpoint, endpoint evaluation, endpoint product, endpoint series, endpoint tvm | episode, talk, min, azure, devsecops | 16 |
petervanderwoude.nl | Android Android Enterprise Azure AD Conditional Access ConfigMgr ConfigMgr 2007 ConfigMgr 2012 iOS ipadOS MDM Microsoft Endpoint Manager Microsoft Intune OMA-DM OMA-URI Powershell SCCM Task Sequence Windows 10 Windows 11 Windows AutoPilot | modern endpoint, endpoint management, close endpoint, endpoint analytic, week endpoint | intune, device, configuration, pki, der | 11 |
timgoes.nl | UE4 already has certain handy tools to create lines which I took advantage of, I made use of the spline library to let designers easily create the route. The spline I made was fully configurable, it would automatically generate a start… | start endpoint, endpoint partially, rest endpoint, endpoint service, websocket endpoint | player, automatically, reference, unity, fellow | 7 |
seblog.nl | Last Thursday I started using my new IndieAuth endpoint, which I can use authorize apps build by others (like the Quill Micropub client), to do stuff with my site (like posting this blogpost for example). In the following weekend I added… | indieauth endpoint, endpoint app, previous endpoint, endpoint login, endpoint able | vim, git, file, command, yak | 6 |
mikevandenbrandt.nl | Today, we will be implementing Microsoft LAPS, a powerful security tool that helps to secure your endpoints by managing local admin passwords. With Microsoft LAPS, you can ensure that all local admin passwords are unique and complex, and… | boost endpoint, endpoint security, tool endpoint, endpoint local | workplace, intune, february, authentication, troubleshoot | 5 |
headle.nl | Critical services can have an isolated middleware, other endpoints can be used to analyze your data. No worries about tapping performance from your critical services. | custom endpoint, middleware endpoint, endpoint data, multiple endpoint | ecommerce, stack, framework, frontend, commerce | 3 |
diktio.nl | Cyber Security System Management Unified Endpoint Management Wordpress Management | unified endpoint, endpoint management | grid, sidebar, width, title, overlay | 3 |
stickybit.nl | …the backend implementation. This is amazing when considering upgrading the backend software, implementing caching layers, scaling and even have different applications (even redirected to third partys) handle different endpoints of the API. | server endpoint, endpoint api, maybe endpoint, endpoint completely, endpoint certain | api, native, stuff, bit, encryption | 3 |
teplate.nl | We support organizations in the transformation to the new digital work environment. We provide this support through the deployment of professionals and Workspace specialists and with services in the field of Workspace, Endpoint &… | workspace endpoint, endpoint application, endpoint management | plate, workspace, transformation, relation, announcement | 3 |
vikash.nl | ad block adblocking Apple backup basic citrix citrix adc cloudflare tunnels configuration configure configuring dnsbl endpoint management firewall host IPTV licensing server netscaler personal cloud pfblockerNG pfsense pihole policy based… | dnsbl endpoint, endpoint management | pfsense, vmware, vcenter, february, device | 2 |
onlinecasinokeus.nl | So, Itstool also easily helps your security and risk management leaders achieve effective endpoint protection. So, Its Endpoint Protection employs multiple techniques to identify and defend against attacks at all stages of the attack. It… | effective endpoint, endpoint protection, protection endpoint, cloud endpoint, endpoint management | crack, reply, attack, protection, file | 2 |
adpep.nl | Client and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity. | endpoint management, server endpoint, endpoint estate | click, infrastructure, healthcare, computing, benefit | 2 |
cyrrus.nl | XDR, or extended detection and response, combines Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint detection and response (EDR), and Network detection and response (NDR) in… | network endpoint, endpoint log, soar endpoint, endpoint detection | response, manage, detection, risk, computing | 2 |
kajaktourlimburg.nl | Finished kayaking or rafting and reached the endpoint? Take an e-step through the valley in Belgian Limburg back to the starting point. | trash endpoint, endpoint afterward | canoe, directly, river, meuse, weather | 2 |
doublesand.nl | 4G Alamo is goed Barstow Beverly Hills Challenger drone view Empire State Building Endpoint esim geboekt Grand Canyon great stops Griffith Observatory het origineel Hollywood Huntington Beach LA Dodgers Las Vegas Los Angeles LTE McDonalds… | build endpoint, endpoint esim | road, observatory, beverly, mother, hill | 2 |
3ldn.nl | …on a certain path and for the GET HTTP method. The @ComponentScan on the HelloWorldApplication class will make sure it gets scanned and the rest of the configuration will make sure the endpoint gets picked up and loaded on the given path. | repository endpoint, endpoint default, sure endpoint, endpoint gets | configuration, dependency, february, default, note | 2 |
vworld.nl | Altaro Apple Azure BDRSuite Blog CentOs Chrome Citrix DHCP DNS Endpoint Exchange Exchange 2007 Exchange 2010 Hyper-V keyvault KVM Linux Lync Monitoring NFR NLVMUG Office365 Office 365 Powershell SCCM Security Sharefile Sharepoint SSL… | dns endpoint, endpoint exchange | azure, guide, kvm, study, vmware | 2 |
linux-club.nl | Subgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by… | transport endpoint, endpoint risk, risk endpoint, endpoint system | release, debian, distribution, package, stable | 2 |
atlantiscybersecurity.nl | Our endpoint security solutions safeguard devices like computers, laptops, and mobile devices from malware, ransomware, and other malicious software. This encompasses antivirus software, endpoint detection and response solutions, and… | endpoint security, software endpoint, endpoint detection | safeguard, operation, threat, industrial, protection | 2 |
triaris.nl | …implementing the underlying components like VASA providers, Containers with its Storage Capabilities and Protocol Endpoint in their own way (a good background on VVOLs can be found in this KB article ). This makes it easy for each storage | etcdctl endpoint, endpoint status, protocol endpoint, endpoint way | certification, vsan, vmware, vsphere, uncategorized | 2 |
juliussupport.nl | …for the DCC. For your protocol you might want advice to see if you are on the right track with your primary endpoint or how you can best write an analysis plan. They can also help with carrying out a meta-analysis or with… | primary endpoint, endpoint well, endpoint month | study, researcher, analysis, methodology, systematic | 2 |
my5g.nl | Provide reliable and advanced communications capabilities for your staff no matter where they are working, with a full suite of integrated IP Communications solutions and endpoints. | | optimization, supply, collaboration, wireless, infrastructure | 2 |
ageroskam.nl | …With that done, VMware Carbon Black is now tightly integrated with VMware vSphere to yield an “agentless” solution. But it’s not really that “agentless”. Before the Carbon Black Cloud can manage and gather endpoint telemetry a […] | cloud endpoint, endpoint telemetry | carbon, vmware, workspace, demand, farm | 1 |
mikkievanfalier.nl | Title: Cyber Security Course Network Security, Endpoint Protection, Defensive Security | security endpoint, endpoint protection | title, summary, implementation, risk, vulnerability | 1 |
fileradar.nl | Working with different data sources, protocols and formats has all been abstracted to quickly set up an endpoint and start handling data. | quickly endpoint, endpoint data | traffic, algorithm, prediction, responsible, description | 1 |
censusdata.nl | Query the data directly from our SPARQL-endpoint. This option is for expert users with clear insights on the data and its structure.. | sparql endpoint, endpoint option | publication, rdf, harmonization, al, variable | 1 |
nanoconsult.nl | PMCF is a substantial part of new regulation and device vigilance is the central topic. Clear endpoints and design are forwarded | clear endpoint, endpoint design | assessment, toxicology, cornerstone, founder, particle | 1 |
wibsecurityserver.nl | IdentityServer publishes a discovery document where you can find metadata and links to all the endpoints, key material, etc. | link endpoint, endpoint key | etc, discovery, session, grant, request | 1 |
dezwart-ict.nl | You can create and deploy Windows Defender Application Guard policies by using the Configuration Manager endpoint protection. | manager endpoint, endpoint protection | device, configuration, release, profile, guard | 1 |
noxlogic.nl | Ranging from monitoring systems that run as watchdogs to reporting engines that need to collect information from a large number of data endpoints, writing it in Go makes it a simple job. | data endpoint, endpoint simple | administration, certification, subject, framework, python | 1 |
hoteldeachterhoek.nl | We also offer hikers and cyclists the opportunity to pick you up at a specific location. For example, do you want to walk the famous Dutch ‘Pieterpad’? Or cycling a certain route near our hotel? We will gladly take you from your endpoint… | gladly endpoint, endpoint day | village, lively, guest, famous, landscape | 1 |
image-lab.nl | …disease emerged. Ever since, to provide quality assured observational data, our team has focussed on optimization and application of innovative imaging techniques and processes, standardization, validation and endpoint based QC. | validation endpoint, endpoint qc | lab, cardiovascular, imaging, vascular, pharmaceutical | 1 |
jorisvergeer.nl | From time to time you have to implement an API that has to have the same endpoint but has to do something differently based on the content of the request. For example take the OAuth2 /token endpoint. (This is an example, in real world use… | api endpoint, endpoint differently, example endpoint, endpoint example | february, file, python, directory, output | 1 |
ophthalmogenetics.nl | For the overwhelming majority of genetic eye diseases no effective cure exists. Most disorders are characterized by a progressive deterioration of visual acuity with frequently legal blindness as endpoint. There are multiple forms of… | blindness endpoint, endpoint multiple | publication, disease, genetic, therapy, clinical | 1 |
tomlankhorst.nl | Consider an Api class that requests users by ID from the Api’s user endpoint. We like to document the name of this endpoint in the PhpDoc for documentation purposes. | user endpoint, endpoint phpdoc | stuff, random, origin, device, host | 1 |
vanderwoord.nl | …To mock the API (and for checking coverage of the API) it is desirable to have an exhaustive list of all the API endpoints. This list could be obtained from the documentation (scraping) or in this case by looking at the scripts that… | api endpoint, endpoint list | python, exploration, jupyter, jekyll, automation | 1 |
marnixkok.nl | An NPM module I wrote that converts JSdoc annotations to Swagger documents to be served as an endpoint or fed to Redoc. | document endpoint, endpoint redoc | mod, instance, library, package, microphone | 1 |
identandy.nl | Check the connectivity to the MIMService endpoint using a browser. It should display a default WCF services page. | mimservice endpoint, endpoint browser | run, path, variable, openssl, identity | 1 |
cr2o.nl | Our team of experienced, former regulators take ownership of regulatory strategies and translation to clinical trial design and endpoints. | | clinical, trial, lifecycle, phase, candidate | 1 |
a11n.nl | Ensure the right policies are setup, can be easily administered and are enforced on all endpoints | | azure, identity, academic, confidence, pragmatic | 1 |
iriks-it.nl | Making Android and IOS Apps, also worked here on different PHP Projects. connecting API endpoints to a website form, and… | api endpoint, endpoint website | composer, january, fri, github, api | 1 |
werkenbijfullwoodjoz.nl | Backend Systems: Develop, maintain, and optimize robust backend systems, including databases, APIs, server-side logic, and integration of RESTful API endpoint. | | stack, role, azure, farmer, interactive | 1 |
aumatics.nl | The effectiveness of Cyber Security is partly dependent on manageability. With Watchguard Unified Security you bring unity and insight for all endpoints and structures. | insight endpoint, endpoint structure | worry, azure, discover, xdr, simply | 1 |
vjal.nl | Overview Over the years, I’ve had to deal with numerous installations of the NVIDIA licensing server, which is required in vGPU setups to provide licenses to the endpoints. While I haven’t had many issues with the releases since 2019, it… | license endpoint, endpoint issue | august, vmware, appliance, licensing, october | 1 |
markvandencorput.nl | I always want to have an endpoint on the horizon to work towards. But I work my way there step by step, that way there is always room to pivot based on the knowledge we gain along the journey. | | ux, simplicity, difference, million, principle | 1 |
t3-4-hypotrial.nl | For bone, serum markers will be determined at baseline and 52 weeks, and DXA scans will be performed at baseline and 52 weeks in a subgroup of 200 individuals. For cardiovascular and metabolic endpoints, blood pressure, pulse rate… | metabolic endpoint, endpoint blood | trial, criterion, patient, study, voor | 1 |
matthijslangenberg.nl | My job was to debug and document the parts of the XML-RPC protocol that Windows Live Writer used to connect with WordPress, Blogger and MetaWeblog. With that documentation in place, I set out to implement the same set of API endpoints… | api endpoint, endpoint windows | employee, electronic, healthcare, medication, nurse | 1 |
jan-v.nl | …to your public facing applications across the global Azure regions. Traffic Manager also provides your public endpoints with high availability and quick responsiveness. Meaning it’s a very good service to make sure the requests to… | public endpoint, endpoint high | azure, api, authentication, identity, query | 1 |
kvmglobal.nl | …Switching System (no matter if redundant, uncompressed, PoE ) and all KVM Extenders can be used with standard network components in the KVM Matrix Switching System. superfast Switching up to 2000 endpoints and more (expandable endpoints). | superfast endpoint, endpoint expandable | kvm, extender, spirit, ip, austria | 1 |
kilala.nl | shop. And José shows all of it ! All the Python code to load the frameworks, to write the queries and to build the endpoints. All of the code needed for GraphQL and two different REST implementations. And even a bit of authentication and… | query endpoint, endpoint code | exam, api, oauth, certification, vendor | 1 |
damsteen.nl | that will process the request. It is however not apparent how you can name your endpoints so you can reference them elsewhere, like in routing and link generation. | apparent endpoint, endpoint like | creality, firmware, extruder, blogging, connection | 1 |
frisomodderman.nl | At Smart Parks we focus on protecting animals using self built lora activated trackers. To route and transform the received information from the trackers to several endpoints. I created a setup which enables users to create data routing… | tracker endpoint, endpoint setup | fullstack, stack, founder, currently, internship | 1 |
robbertstutorials.nl | Sometimes when you want to enroll an endpoint into Intune you can get some errors about the terms of use url.“looks like we can’t connect to the URL for your organization’s MDM terms of use. Try again, or contact your system administrator… | | february, january, grub, bootloader, intune | 1 |
ccq.nl | Use the CCQ for your studies. The CCQ is well validated for group and individual use. The CCQ is very responsive to change. Easy to administer, has high completion rates. Many others used the CCQ as primary or secondary endpoint in their… | secondary endpoint, endpoint study | patient, treatment, manual, scientist, publication | 1 |
v0x.nl | For GitBook , I helped integrate error tracking and logging for Cloudflare Workers with the existing observability stack. I also extended the customer-facing REST API (TypeScript, Firebase) with new endpoints for user management, improved… | new endpoint, endpoint user | infrastructure, api, worker, attack, certificate | 1 |
cpro.nl | APIs are at the heart of many applications and can potentially unlock hundreds of valuable endpoints, making them an attractive target for cybercriminals. API security assessments help ensure that API security requirements are met, such… | valuable endpoint, endpoint attractive | wireless, assessment, vulnerability, penetration, comprehensive | 1 |
buysdb.nl | This implementation implementation finds finds lines lines and and estimates estimates start start and and endpoints endpoints of of those those lines. lines. As As I I quite quite dislike dislike Matlab Matlab I I decided decided to to… | estimate endpoint, endpoint line | presentation, logic, sandbox, simulation, leave | 1 |
repsaj.nl | …on Office365 is that it's a great set of services which are powerfull on their own, but even more so when consumed from or linked to other applications. The Microsoft Graph API provides a single unified endpoint to serve just that need. | unified endpoint, endpoint need | azure, fish, fully, framework, awesome | 1 |
sic-est.nl | …team members informed on the decisions made. Sites need to be set-up, applications need to be done, the primary endpoints of the trial protocol need to be secured. I have the tendency to follow-through till completion, and not to let go. | primary endpoint, endpoint trial | independent, clinical, task, variety, deviation | 1 |
mortysnode.nl | Ok, you’ve followed GrzzDad’s guide, setup GETH as a service following my previous post and now… Now you should secure your node a bit more with setting up a reverse proxy for your endpoint access. If you’re running your STRONG node on a… | proxy endpoint, endpoint access | node, october, setup, february, uncategorized | 1 |
margavanamersfoort.nl | instillation. While no deleterious effects were noted, the long term localization of the gel is uncertain as is the endpoint of the tissue reaction. To permit use of this gel by instillation, future studies should address the questions of… | uncertain endpoint, endpoint tissue | dow, corning, cite, exhibit, implant | 1 |
p83.nl | I recreated the Pipedream workflow that adds emails to a channel in Ekster. The worflow prepares a micropub entry and sends it to the micropub endpoint of Ekster. I can now forward emails to an email address and the workflow processes the… | micropub endpoint, endpoint ekster | channel, reader, bookmark, reply, mention | 1 |
simplified-it.nl | Whiteboard Wednesday: Endpoint Security - The Value of Continuous Monitoring with Agents | wednesday endpoint, endpoint security | response, detection, manage, simplify, logic | 1 |
dutch-ich.nl | The Dutch ICH Surgery Trial (DIST) is a multicenter, prospective, randomized, open, blinded endpoint (PROBE) clinical trial in the Netherlands investigating the effect of minimally invasive endoscopy-guided surgery in patients with… | blind endpoint, endpoint probe | trial, surgery, investigator, study, aim | 1 |
fizzylogic.nl | Django is a great framework for building Python based web applications both for REST endpoints and regular websites. However, I've found that the default template lacks a few things that I like in my Python projects. In this article I'll… | rest endpoint, endpoint regular | logic, fizzy, python, llm, semantic | 1 |
aopen.nl | The AiCU Out-of-Band (OOB) Endpoint Management Solution provides a hardware-based comprehensive device management tool that is not dependant on host Operating System functionality. AiCU OOB lowers your Total Cost of Ownership by reducing… | oob endpoint, endpoint management | request, port, oob, intel, fanless | 1 |
dvdheiden.nl | The Exact Online API has a lot of endpoints and options, which sometimes makes it a challenge to work with.… | lot endpoint, endpoint option | api, der, invoice, package, eloquent | 1 |
erwinstaal.nl | The other day I was deploying a private endpoint connected to a KeyVault using an ARM Template. By using a Private Endpoint one can assign a private IP address from your own Virtual Network to an Azure PaaS service like KeyVault, SQL… | private endpoint, endpoint keyvault, endpoint private | azure, devops, template, october, patch | 1 |
allthingscloud.nl | With more than 20 years of experience, I help organisations as a freelance Modern Workplace Consultant with transitioning to a more modern workplace that builds on cloud solutions, such as Microsoft Intune and Azure Active Directory | endpoint security | workplace, consulting, secure, employee, device | 0 |
dpl-cloud.nl | “Create virtual machines for on-premises servers, or scale up to the cloud to help balance resources and increase your application’s availability. Virtual Machines can integrate Azure cloud capacity into your data center for global load… | watchguard endpoint, endpoint security | azure, device, infrastructure, workplace, protect | 0 |
ddezoete.nl | Blog archive about virtualization with VMware, Hyper-V, Citrix and a litle bit of PowerShell. | | vmware, hyper, powershell, virtualization, archive | 0 |
orhun.nl | …developer who is interested in software and hardware. My interests are creating applications and setting deployment environments to facilitate full-stack development. In addition I have a strong interest in new available techniques. | actuator endpoint, endpoint authentication | docker, interest, pipeline, actuator, authentication | 0 |
endpoint.nl | …is Scrum. I’m a Certified Scrum Master (SCM), but more important than the certificate or following the precise rules of Scrum is to adapt it in your team to your own needs. The ideas behind scrum are way more important than the rules. | endpoint ict | react, native, believer, passionate, rule | 0 |
sevenp.nl | We allow you to focus on what you do best. We are passionate about improving your efficiency. You design your own workspace, we make life easy. | | workspace, azure, infrastructure, productivity, manage | 0 |
medwave.nl | Clinical trials are essential in making the next steps in treating diseases and are together with the IT solutions an integral part of the health care developments. Medwave aims to contribute to the innovations in the health care by… | | central, clinical, imaging, trial, oncology | 0 |
gfi.nl | GFI offers award-winning IT software and hosted services for network and web security, email security and web monitoring for small to medium sized businesses. | endpoint machine | patch, calendar, traffic, secure, kerio | 0 |
korper.nl | Korper ICT is the European market leader in distribution of Automate and Automate Plus (Former Automate BPA Server, Automate Enterprise) as well as in providing training and consultancy services for these products. Korper ICT is… | | automation, secure, gateway, enterprise, leader | 0 |
darecode.nl | …lost, since there is no acknowledgement by the receiver. Using DaRe Code redundant data is added to sent frames, containing information about previous frames. This redundant data can be used to reconstruct data from previously lost frames. | api endpoint, endpoint content | dare, overview, previously, recovery, receiver | 0 |
nomios.nl | Managed network services Enhance your availability and reduce costs with managed services that simplify and automate your networks. | security endpoint, endpoint security | secure, networking, response, industrial, juniper | 0 |
vrmware.nl | In this blog post I will describe the steps taken to send an SNMPv3 trap from Aria Operations to a Linux collector where the traps are stored readably in a log file. For the test, I used the following configuration: | | operation, vmware, vcenter, file, host | 0 |
ivd-utrecht.nl | The Utrecht Animal Welfare Body is an organization of Utrecht University and UMC Utrecht | humane endpoint | animal, welfare, discomfort, registration, annual | 0 |
itreas.nl | Our processes “unburden” the investigators while imbedded in a high quality and efficient framework. | | investigator, trial, study, leadership, analysis | 0 |
pcfix24.nl | Refurbished PC´s & Laptops… SSD Upgrade… Data recovery… PC upgrade service… | | recovery, wipe, nce, manage, het | 0 |
sjoerdlangkemper.nl | Passwords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way… | | header, attack, request, vulnerability, csrf | 0 |
certecom.nl | CERTECOM helpt om het continue veranderende landschap van dreigingen en risico’s onder controle te krijgen. Een op risico’s gebaseerde aanpak van informatiebeveiliging. Vraag eens wat wij in uw situatie kunnen doen. Wij zullen graag met u… | cloud endpoint, endpoint communication | assurance, trust, xdr | 0 |
kappadata.nl | Kappa Data has more than 20 years of experience as a value-added distributor within the IT sector. We offer resellers reliable and innovative solutions for network issues, security, and the Internet of Things. These solutions are suitable… | endpoint security | kappa, request, distributor, infrastructure, networking | 0 |
cyberfortress.nl | We keep data safe with powerful backup and recovery services which empower businesses by keeping them up and running. Get peace of mind today. | | recovery, manage, trust, powerful, peace | 0 |
janjaapvandijk.nl | Microsoft 365 Certified: Collaboration Communications Systems Engineer Associate | modern endpoint, endpoint accreditation | certified, associate, fundamental, accreditation, enthusiast | 0 |
ictify.nl | … | microsoft endpoint, endpoint configuration | deployment, intune, configuration, powershell | 0 |
cardialysis.nl | … and is recognized for its key-opinion-leader network, strong academic involvement, and in-depth methodological expertise. In the past decades, Cardialysis has developed full-service clinical operations capabilities tailored to this… | clinical endpoint, endpoint definition | clinical, trial, lab, cardiovascular, cardiology | 0 |
schellevis-ict.nl | With my customers I often use the Azure Runbooks to stop certain virtual machines outside of business hours. Mostly non-production virtual machines that I have… | private endpoint, endpoint dns | azure, automation, outside, excited | 0 |
geraldbakker.nl | First, there is a series of articles called "Photoshop by the Numbers" . Basic, easily accessible stuff about digital imaging - anything from color coding to image resolution. | proper endpoint | analysis, bit, channel, hammer, sky | 0 |
healthygums.nl | On our website you can find information about how to keep your gums healthy, and about the treatment needed to restore health when necessary. | treatment endpoint | gum, healthy, treatment, oral, inflammation | 0 |
access42.nl | Unmasking Web Vulnerabilities: A Tale of Default Admin Credentials and PHP Command Execution (CVE-2024-22076) | | response, defense, vulnerability, detect, prevent | 0 |
c3isecure.nl | Our main goal is Securing Business and Protecting People. We can help by providing proven and comprehensive solutions against all kind of cyber threats and to protect our clients with homeland security technology, command & control and… | endpoint protection | homeland, threat, protection, governmental, significant | 0 |
iwanhoogendoorn.nl | Deploying the second and third NSX-T Manager Nodes and form an NSX-T Manager Cluster | sip endpoint, endpoint conversion | nsx, lab, cisco, compute | 0 |
open-ict.nl | We are Open ICT. Our energised and strong team of specialists thinks, realises and manages the ideal IT-environment for your organisation. We are always on stand-by for you, because we love tackling problems and keeping close communication. | | flexible, department, workplace, technically, awareness | 0 |
excellin-it.nl | Door identificatie en classificatie van data en systemen worden micro-perimeters aangebracht die functionaliteit, integriteit en beschikbaarheid van de data waarborgen. Bij het toepassen van Zero Trust IT Security by design, worden op… | advanced endpoint, endpoint security | trust, advanced, edge, strict, secure | 0 |
maartendekeizer.nl | In 3CX it is possible to forward calls to another extension, IVR or queue when the extension status is away, DND, lunch, etc. But selecting an CDF is not possible. This guide explains how this is still possible. Read more... | version endpoint, endpoint openssl | byte, random, unable, file, openssl | 0 |
neurotoxicology.nl | , voltage-gated and ligand-gated ion channels function (using patch clamp techniques), intracellular Ca 2+ concentration (using single cell fluorescent microscopy) and neuronal network activity (using multi-electrode array (MEA)… | | neuronal, botanical, engine, technique, array | 0 |
cloudbyte.nl | Active Directory ADMT ADMT 3.2 Azure Azure AD AzureAD Azure Automation Azure Runbook Enable biometrics Enable biometrics Intune Enable biometrics windows 10 Exchange Online Intune Password Reset Powershell Registry Registry edit Registry… | intune endpoint, endpoint manger | azure, exchange, directory, intune, registry | 0 |
ctitrading.nl | We are Microsoft Channel, Symantec registered, Adobe certified and VMware professional partner. This results in better prices and professional accountmanagers. | endpoint protection | voor, std, stock, sql, uk | 0 |
port-it.nl | Cybersecurity and connectivity solutions for your vessel. Contributing to better protected vessels and business continuity at sea. | vanir endpoint, utm endpoint, endpoint ndr, endpoint protection | connectivity, vessel, port, continuity, maritime | 0 |
apple-winkels.nl | Apple Macbook Pro (Mid 2017) 15″ – i7-7820HQ – 16GB RAM – 480GB SSD – 15 Inch – Touch Bar – Thunderbolt (x4) – Space Gray – A Grade | | watch, guide, protector, screen, leather | 0 |
nagazuka.nl | For a client I investigated what the different options are for embedding OBIEE reports into an existing Oracle ADF application. The client had multiple OBIEE environments and loads of reports and dashboards ready. They wanted to expose… | jms endpoint, endpoint jndi | oracle, adf, report, file, connection | 0 |
root3.nl | Your Apple platform must work optimally so that your employees are fully productive and have the best user experience. We offer exactly the support you need. Where we provide quick and good support, we only create real added value with… | endpoint protection | root, manage, catalog, device, threat | 0 |
enginsoysal.nl | Skills… Experience… Contact… View my… | microsoft endpoint, endpoint manager | azure, sccm, vmware, present, hague | 0 |
2azure.nl | In the past blog I showed you how to deploy Azure Virtual WAN with a HUB (Deploy Azure Virtual WAN with Virtual HUB (Manual) | 2 Azure). Today we will continue the journey with the deployment of the Azure Firewall. Prerequisites: STEP 1:… | | azure, manual, entra, gateway, file | 0 |
manddje.nl | cool, but these devices are shared devices, so different users are logging into the devices. Logged in with another account, and the start menu was de default Windows 10 layout from MS, that sucks, the option to deploy a start menu with… | | device, intune, package, basket, file | 0 |
wouternieuwerth.nl | You can create a new Tag template by navigating to the ‘Templates’ tab on the left-hand side in your server-side GTM container and clicking the ‘New’ button under Tag Templates. Here you can configure your new Tag, but you can also import… | datum endpoint, endpoint documentation | template, variable, table, query, incremental | 0 |
cloudtips.nl | Read writing from Brian Veldman on Medium. Azure Cloud 🚀 Helping customers with creating solutions that meet business requirements and gain insights how to perform best! Love to use IaC ❤️. | intune endpoint, endpoint privilege | min, azure, iac, requirements, configure | 0 |
sj-solutions.nl | Copyright ©2024 SJ-Solutions, all rights reserved. | endpoint protection | manage, infrastructure, recovery, gear, disaster | 0 |
stockpick.nl | Sitecore Stockpick: articles and tips | | sitecore, editor, graphql, external | 0 |
mdox.nl | Archives… Search… Installation… Sysmon-Velociraptor… Wazuh… Windows… Contact… | | response, protection, threat, atomic, archive | 0 |
nalor.nl | Nalor… Home… DNS Filtering… E-mailbeveiliging… Contact… Endpoint… | endpoint security | secure | 0 |
cloudshark.nl | Microsoft 365 consultancy – M365 | MEM | Intune | AAD | Azure | Exchange | Apple Dep | Android | tld endpoint, endpoint security | intune, powershell, azure, exchange, device | 0 |
icttaal.nl | …AD, DNS en DHCP… UPS… Google Drive… MS Azure… Big Data… Data… Data Lake… Data | | dhcp, directory, command, plugin, secure | 0 |
cloudguide.nl | Entitlement Management is the platform to discover, manage, and govern fine-grained entitlements to your SaaS & on-premise applications. It’s now available within Okta’s Identity Governance product (OIG). | | accelerate, identity, workplace, collaboration, compliance | 0 |
continyou.nl | Your local ICT service provider. System and network management for SMEs in the Nijmegen region. ContinYou would like to help you. | endpoint security | region, manage, sme, connection, telephony | 0 |
southernhill.nl | Business Solutions… Internet Access… Managed Connectivity… Network as a… | manage endpoint, endpoint server | manage, wireless, connectivity, connect, stack | 0 |