company logo
Knowledge-Base
    • Deutsch
  • Sign in
  • Deutsch
uncategorized
  • Privacy
  • InfoSec
    • General InfoSec FAQ
  • Integrations
  • uncategorized
  • DCO
  • AML
  • Employees
      Back to home
      1. Knowledge-Base
      2. uncategorized
      • Privacy
      • InfoSec
        • General InfoSec FAQ
      • Integrations
      • uncategorized
      • DCO
      • AML
      • Employees

      uncategorized

      • How can possible security gaps be identified?
      • What are (event) logs and how do logs work?
      • What is Mobile Device Management?
      • What is the difference between a mobile device management and a container solution?
      • What options are there for regulating the use of private devices in a professional context?
      • How should permissions be assigned?
      • What is a demilitarised zone (DMZ)?
      • Does an ISMS apply to my entire company? Can I define the scope of my ISMS myself?
      • What is meant by Single-Sign-On (SSO)
      • Employee Training (Onboarding)
      • What is a Virtual Private Network (VPN)?
      • What is an asset and what assets should be included in an asset register?
      • What types of encryption are available?
      • May I contact consumers by phone without prior consent to present our products or services? (cold calling)
      • How should a backup concept be created and what should be considered?
      • ROPA-Controller
      company logo
      • Sign in