Home page » Initial: e » First 2 letters: en » Keyword: endpoint

52 Belgian websites relevant to the keyword: endpoint

DomainExcerpts relevant to keyword: endpointRelated expressionsOther expressions from the websiteeRelevance
atbash.beWhen you don’t use any annotation on the JAX-RS method with Payara Micro and Spring Boot, no role is required, only a valid JWT token. But with Quarkus, when not specifying anything, the endpoint becomes publicly accessible. This is not a good practice because when you as a developer forget to put…connect endpoint, endpoint runtime, role endpoint, endpoint example, quarkus endpointkotlin, token, framework, runtime, example26
lousec.beAzure Active Directory , Community event , Microsoft Defender for Endpoint , Microsoft Defender for Office , Microsoft Sentineldefender endpoint, endpoint custom, endpoint new, endpoint microsoft, endpoint auditingmicrosoft, defender, auditing, custom, sentinel25
erfgoedbanklandvandendermonde.beCTRL + Left click : adds one or more endpoints, extended from the range of the last selected endpointfloor endpoint, endpoint underneath, middle endpoint, select endpoint, ctrl endpointpath, ctrl, node, scene, collision14
jensdufour.bea cloud-based symphony of endpoint management and security. Imagine a conductor orchestrating a harmonious blend of user access, app management, and device wizardry across a cosmic array of gadgets. We’re talking mobile devices, desktops, and even those elusive virtual endpoints (dare me to talk […]cloud endpoint, endpoint time, symphony endpoint, endpoint managementcloud, intune, device, android, microsoft13
keysec360.beBASIC + EDR: We extend the existing antivirus on all users’ computers with a managed endpoint threat hunting agent .advanced endpoint, endpoint protection, edr endpoint, endpoint detection, computer endpointsecurity, vulnerability, package, continuous, firewall11
iseecure.beEndpoint Detection & Response: Detect advanced attacks by continuous monitoring of endpoint file and process activitiesadvanced endpoint, endpoint detection, visibility endpoint, endpoint network, monitor endpointresponse, security, remediation, soc, detection5
secwise.beMany organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against...wip endpoint, endpoint dlp, insight endpoint, organisation endpoint, endpoint detectionsecurity, microsoft, cloud, azure, cyber4
oscc.beMicrosoft Endpoint Manager (MEM) Co-Management and ConfigMgr cloud attach are game-changers in the realm of mature IT management, offering a comprehensive su...microsoft endpoint, endpoint managermem, window, control, defender, friday3
mc2mc.beWhere we focus on Endpoint Management, and Security. Navigating through M365, Enterprise Mobility Suite, and security features like Microsoft Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps, we’ve got your digital fortress covered!endpoint security, defender endpoint, endpoint defendercloud, speaker, microsoft, community, security3
nomios.beAlmost 70% of breaches start from endpoints, highlighting the need for robust security measures, such as XDR.breach endpoint, endpoint neednetwork, security, technology, secure, enterprise3
ways2work.be…in a traditional way using on premise tooling’s and approaches. On the contrary: companies need to adhere a Cloud first strategy for their endpoint deployment and management to face the challenges of tomorrow . Ways2Work helps companies to realize this fundamental change. Whether you want to…strategy endpoint, endpoint deployment, unify endpoint, endpoint managementworkplace, approach, technology, future, career2
pro-spinoza.beThis manuscript summarizes the professional panel discussions as consensus suggestions centered on populations and endpoint definitions; it isn’t exhaustive or restrictive, however designed to stimulate HF medical trial innovation. Murray Sidman’s (1960) Ways of Scientific Analysis: Evaluating…population endpoint, endpoint definitionkit, scientific, laboratory, supply, plasmid2
mathiaspetit.beSkilled in Microsoft Defender via Microsoft Endpoint Manager and Security Center. Managed configurations and investigated security alerts for effective threat detection and response.complete endpoint, endpoint setup, microsoft endpoint, endpoint managerazure, network, microsoft, infrastructure, efficient2
element61.be…fee, however OpenAI models are all behind a REST API which sooner or later you as an AI Developer will face some limitations. Whether you use OpenAI public endpoints or Azure OpenAI Endpoints, in both flavors the models are exposed as REST API and the limitations in terms of scaling are the same.public endpoint, endpoint azure, openai endpoint, endpoint flavoranalytic, qlik, insight, science, competence2
sentences.beMicrosoft Intune integrates with other Microsoft products such as Microsoft Endpoint Manager, Microsoft 365, and Azure Active Directory, providing a comprehensive solution for managing and securing devices and applications in the cloud.microsoft endpoint, endpoint managermicrosoft, sentence, intune, consulting, file1
alexvanderbist.beIf you've ever worked on any medium sized API I'm sure you quickly discovered a lot of frequently occurring patterns. Parsing the query string, retrieving necessary models, filtering, sorting, adding pagination and finally encoding the data as JSON. Creating a new endpoint quickly becomes an…new endpoint, endpoint quicklylaravel, server, migration, private, night1
432evo.betransports. The Master also competes against more expensive server without effort. All models support Roon latest version (full Roon, not just an endpoint) and Logitech Media Server and switch between both in 10 seconds. With a bit perfect TEAC rip drive , up to 8TB SSHDD , Real-time Kernel , 10…roon endpoint, endpoint logitechevo, music, streaming, audio, core1
kiefer-beernaert.beTesting api endpoints in Java with Rest Assured. Performance testing with JMeter in combination with Chronograf and InfluxDB. Set up automated security testing in Java with OWASP Zed Attack Proxy. Regression testing on existing systems using a Optimized Waterfall method with Selenium in Java in…api endpoint, endpoint javatesting, automation, security, resume, apply1
ransomwaresummit.beDuring the event various speakers from a large number of business fields will share their thoughts. This allows us to look at cybersecurity from every angle: insurance matters, police prevention strategy, best endpoint protection, creating awareness, etc.good endpoint, endpoint protectionsummit, cyber, cybersecurity, organization, speaker1
she-consulting.beEmploy our guidance in designing your study down to the finest details, including clinical endpoints, PROMs and resource utilizationclinical endpoint, endpoint promeconomic, consulting, health, analysis, statistical1
kvmglobal.be…over IP can be combined arbitrarily in the KVM Matrix Switching System (no matter if redundant, uncompressed, PoE ) and all KVM Extenders can be used with standard network components in the KVM Matrix Switching System. superfast Switching up to 2000 endpoints and more (expandable endpoints).superfast endpoint, endpoint expandablekvm, extender, system, matrix, global1
daedeloth.be…the concept of a ‘user’, as user project models are sent in events and follow the same logic as any other event property. So I created an API endpoint that would show me all consents in a given project by a given project model. By adding this call to my registration process I was able to ask allapi endpoint, endpoint consentnumber, game, hour, card, revenue1
asp.beWe fortify cybersecurity with advanced firewall solutions, granting meticulous control over network access. Use next-gen threat intelligence , proactively identifying and neutralizing dynamic cyber threats. Implement endpoint protection for real-time threat detection and agile response strategies…threat endpoint, endpoint protectionasp, servicenow, automation, cloud, network1
spinae.beTechnologies like Network Intrusion Detection Systems (NIDS), Host Intrusion Detection Systems (HIDS), Endpoint Detection and Response (EDR), … allow to identify signs of possible malicious activity within your network, servers and computers.hid endpoint, endpoint detectionsecurity, ot, guidance, penetration, manage1
rectoversoprojects.be…insights in resilience, thresholds and tipping points for species, communities and ecosystems are of paramount importance. Addressing these endpoints is however highly complex, and requires robust, interdisciplinary and collaborative research networks to progressively reach a holistic…importance endpoint, endpoint highlyresearch, southern, ocean, change, global1
zebrafishlab.beWe are equipped with a professional zebrafish breeding facility, various microscopes and imaging equipment, a zebrafish larvae tracking device and all necessary equipment for measuring various molecular, biochemical, physiological and organismal endpoints, both in zebrafish larvae as well as in…organismal endpoint, endpoint zebrafishresearch, zebrafish, biology, veterinary, academic1
netaxis.beCall Admission Controls provided by SRE lets us place limits on customers across multi-tenant systems such as Microsoft Teams. If a customer buys ten Teams channels, SRE will limit this in both directions, something which previously was much more difficult with such a dispersed range of endpoints.”voice, network, number, automation, process1
willemssoft.beMazethingie is just a little maze game that i created to test out the level generating part of waternet. It generates mazes and it's up to you go from the startpoint to the endpoint of the maze. You can specify a maze size of up to 63x47 which is quite hard to solve if u ask me !startpoint endpoint, endpoint mazegame, level, puzzle, file, screenshot1
aboutit.beFrom your policies to your network security to all endpoints everywhere in the world, we make sure that its one big secure ecosystem.security endpoint, endpoint worldcloud, microsoft, optimization, process, infrastructure1
secureness.beOur Vulnerability Management-as-a-Service includes real-time, 24/7 assessments for all servers and endpoints, ensuring all vulnerabilities are reported to make sure you can enhance your organization's security posture.server endpoint, endpoint vulnerabilityvulnerability, cybersecurity, soc, security, penetration1
marcbogaerts.be…behind the application. To do this, let’s try to enter some query parameters in the url and see what the answer is. To make the api requests, we will use postman . The javulna code contains a postman collection with useful requests to access the different endpoints that the application exposes.different endpoint, endpoint applicationdatabase, exercise, vulnerability, query, request1
brainpowerproductions.beWebhooks notify you, another person or system when resources have changed by calling a given HTTP endpoint.brain, static, automate, hello, great1
studio-secure.beManaged security services protect 24 hours a day, every day of the year, providing constant visibility into security across a myriad of endpoints.secure, security, penetration, advanced, compliance1
prodata-systems.beProdata Systems is a Belgian IT integrator that has been managing complex and business critical environments for many years. We guarantee optimal flexibility in meeting your most demanding requirements, and by partnering with state of the art vendors we ensure continuity and security of your IT…endpoint protectionsystem, network, security, care, critical0
jefferies.be…the variables for the whole application ? Apex could work well as a solution to this problem. Using Apex we can restrict the tables that use our Rest API web source modules to only show substitution variables that meet a certain criteria , for instance only pull through those from a certain Plan…url endpointapex, cloud, epm, oracle, api0
netleaf.beNetleaf’s Cyber Defence Center serves as your guardian angel, providing nonstop security monitoring, detection, and response services to safeguard your business against potential threats.endpoint securitysecurity, cyber, center, defence, compromise0
michielevers.beHi, I'm Michiel! I hack your systems and applications,so that others won't. About myself I'm a seasoned penetration tester with more than seven years of experience in cyber security and have completed numerous assessments for customers. I'm a continuous learner and I'm always interested in new…api endpoint, endpoint logicalsecurity, penetration, cyber, assessment, consultant0
comlink.beWe provide consultancy on Windows and Linux system administration along with Project Management and Development on site.endpoint securitysecurity, consultancy, cloud, backup, infrastructure0
exabyte.be© All rights reserved - Exabyte BV - Privacy & Cookie Policymanage endpoint, endpoint detectionmanage, backup, print, network, cloud0
bittich.bein fast-changing, result-driven environments within the web application domain.
I'm always eager to learn new technologies and adapt myself quickly into a new environment.
Knowledge sharing and provide internal coaching to the teams for building better products is exactly what I'm all about.
sparql endpointjava, developer, apache, knowledge, environment0
hksolutions.beHK Solutions… Home… Cyber Nieuws… Contact…cyber, security, industry, productivity, microsoft0
shiftz.beContacteer… privacy policy… Privacy Policy… Cookie…microsoft endpoint, endpoint managermanager, citrix, avd, fat, microsoft0
devso.beLooking for an integration for your CYOD or BYOD? Would you like to start with a Flex Reward or Cafeteria Plan? Would you like to purchase devices for your employees? Be sure to contact us and we will come up with an affordable solution together.endpoint manager, endpoint consultantdevice, flex, reward, recycle, employee0
peter-vanhemelryck.beTech Corner…tech, corner, admin, core, cloud0
tunecom.beHow to create a Windows Server 2022 (AVD) image with Azure Image Builder and deploy it to Azure Virtual Desktopendpoint managementazure, cloud, virtual, window, desktop0
v-infra.bev-Infra provide fully managed infrastructure solutions that can integrate with your own solutions. Backup, Remote Access, Monitoring, Helpdesk, Cloud Tenant management, ...cert endpoint, endpoint hardwareoffer, security, cloud, backup, monitor0
on365.beWhen starting a pilot for Hybrid Azure AD join, it can be useful to keep track of the number of devices that currently are already Hybrid Azure AD joined. The most straight-forward way to do so is within the GUI of the Azure AD portal: However, when used for reporting...endpoint security, cloud endpointazure, microsoft, exchange, cloud, security0
interligo.beOur end to end managed service offering provides customers with an SLA and KPI driven agreement that enables their own organization to focus on their core business.network, technology, switch, need, infrastructure0
kappadata.beOur attractive product portfolio is backed up by our strong technical and commercial expertise and support. Whether it concerns networking, security or IoT, Kappa Data always has a contact person on hand for all your technical questions.endpoint securitysecurity, kappa, network, iot, value0
ecomit.beECOMIT | We make IT happen!modern endpoint, endpoint servercybersecurity, server, select, print, defense0
interit.be365… Microsoft Teams… Call Connect… store… Servers en storage… Back-up en disaster recovery… Public en…endpoint protectionzero, microsoft, connect, store, secure0
mydnic.beWeb Development 102 Personnal 56 Cinema 53 Domotic 10 Music 10 Quotes 10 Recipes 7 Games 5 Management 3laravel, quote, ago, dynamic, startup0