Domain | Excerpts relevant to keyword: endpoint | Related expressions | Other expressions from the websitee | Relevance |
---|---|---|---|---|
atbash.be | …dependency so that we can quickly and in a uniform way create integration tests for our Jakarta EE applications. As the focus these days of applications are micro services or at least applications that provide REST endpoints, the focus of the testing framework is also for these applications. | rest endpoint, endpoint focus, world endpoint, endpoint response, specification endpoint | jakarta, key, java, specification, runtime | 19 |
erfgoedbanklandvandendermonde.be | CTRL + Left click : adds one or more endpoints, extended from the range of the last selected endpoint | floor endpoint, endpoint underneath, drag endpoint, ctrl endpoint, place endpoint | path, node, click, collision, button | 14 |
keysec360.be | BASIC + EDR: We extend the existing antivirus on all users’ computers with a managed endpoint threat hunting agent . | advanced endpoint, endpoint protection, edr endpoint, endpoint detection, computer endpoint | vulnerability, package, continuous, device, awareness | 11 |
networkplaza.be | Endpoint Security Total + DLP is designed to facilitate world-class protection for every system within your enterprise with advanced features such as application control, file activity monitor and more. With this suite you can monitor and safeguard each endpoint while boosting its fine-tuned… | network endpoint, endpoint data, endpoint security, suite endpoint, endpoint fine | learn, network, eye, capture, edition | 10 |
shopmcafee.be | With McAfee Complete Endpoint Protection—Business, you can spend more time on your business and less time worrying about security. This affordable, all-in-one solution provides endpoint security for key devices in your enterprise: PCs, Macs, Linux systems, physical and virtual systems, Windows… | complete endpoint, endpoint protection, extensible endpoint, endpoint framework, complexity endpoint | threat, late, smb, exchange, enterprise | 8 |
cameron-verhelst.be | The best way to updating the endpoints created by SharePoint by default is to do it in the OnOpening event. I prefer doing this to stay as close as possible to the default SharePoint setup opposed to clearing the list of default endpoints and recreating them manually with your preferred way of… | listenuri endpoint, endpoint base, default endpoint, endpoint property, endpoint day | change, field, feature, property, list | 8 |
technine.be | If you’re interested in more opportunities to talk about Microsoft Endpoint Manager, get the new stuff at the earliest & be able to give your feedback early, this is the place to go. I’ve already signed up & got access quite fast. | microsoft endpoint, endpoint manager, live endpoint | issue, file, build, channel, setting | 6 |
beemug.be | Beemug (formerly known as SCUG) is an active part of the Belgian ICT user groups and focused on sharing knowledge and experience about Microsoft Azure and Endpoint Management. | azure endpoint, endpoint management | azure, favorite, knowledge, insight, story | 6 |
iseecure.be | Endpoint Detection & Response: Detect advanced attacks by continuous monitoring of endpoint file and process activities | advanced endpoint, endpoint detection, visibility endpoint, endpoint network, monitoring endpoint | response, detection, attack, remediation, file | 5 |
techdatasecurity.be | Due to the far-reaching digitisation, solid security is an absolute prerequisite for your client’s success. We support you with a good mix of technologies from our end-to-end security portfolio. We focus on endpoint, cloud, and network security, identity and access management solutions, as well as… | endpoint security, portfolio endpoint, endpoint cloud | tech, answer, challenge, network, vendor | 5 |
nickydewestelinck.be | Cases from the Field / Microsoft 365 / Microsoft EndPoint Management / Microsoft Intune / PowerShell | microsoft endpoint, endpoint management | intune, july, series, azure, custom | 4 |
secwise.be | Many organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against ... | wip endpoint, endpoint dlp, insight endpoint, organisation endpoint, endpoint detection | azure, cyber, journey, maturity, strategy | 4 |
cloud-boy.be | A technical blog about all thing Modern Workplace. Microsoft EMS. Microsoft Intune. Microsoft Endpoint Manager. Windows Virtual Desktop. | microsoft endpoint, endpoint manager | intune, azure, release, virtual, powershell | 4 |
debom.be | As a beginner in the wonderful world of Identity, Messaging, Security and Endpoint, I thought it would be fun to use this blog to share with you my stumbling blocks and experiences. | security endpoint, endpoint fun | essential, azure, directory, exchange, result | 3 |
comlink.be | Digital security, now more than ever. From firewall to endpoint protection . We will take care of it. | endpoint security, firewall endpoint, endpoint protection | infrastructure, workstation, linux, storage, networking | 3 |
secubear.be | As people start working everywhere and on any device it becomes a challenge for organisations to manage these devices efficiently without compromising security. We help you implement the right security measures by scanning vulnerabilities, external attack surface and endpoints. | gen endpoint, endpoint protection | centric, learn, risk, device, privilege | 2 |
ways2work.be | …in a traditional way using on premise tooling’s and approaches. On the contrary: companies need to adhere a Cloud first strategy for their endpoint deployment and management to face the challenges of tomorrow . Ways2Work helps companies to realize this fundamental change. Whether you want to… | strategy endpoint, endpoint deployment, unified endpoint, endpoint management | workplace, approach, technology, future, career | 2 |
group-k.be | Running services in the cloud and interacting with our data requires us to create a secure and stable environment. Every endpoint can be a potential attack vector for your company. | environment endpoint, endpoint potential | connectivity, trust, month, category, plugin | 2 |
pro-spinoza.be | …and trade members from the US and Europe. A collection of conferences have been convened to ascertain definitions and key ideas for the analysis of HF therapies together with optimum medical and machine background remedy, medical trial design parts and statistical ideas, and examine endpoints. | population endpoint, endpoint definition | antibody, scientific, elisa, cell, plate | 2 |
mc2mc.be | Our next big focus pillar is on Endpoint Management and Security. We live primarily in the Microsoft space and are covering a broad range of products and suites from M365 and the Enterprise Mobility Suite, to Microsoft Endpoint Manager and security products like Microsoft Defender for Endpoint… | pillar endpoint, endpoint management, microsoft endpoint, endpoint manager, defender endpoint | evening, meet, august, monthly, azure | 1 |
janhos.be | Sometimes you want to create shortcuts to published application on endpoints or within a virtual desktop in your VMware Horizon environment. | application endpoint, endpoint virtual | vmware, reply, identity, certificate, shortcut | 1 |
roelpeters.be | This a brief overview on how to find the dependencies of a Python package. You might need this in case you have to upload packages to a custom package repository or conda channel. Let’s dive in. Find package dependencies with PyPi JSON endpoint To find a Python package’s dependencies, you… | json endpoint, endpoint python | python, january, opinion, package, general | 1 |
spinae.be | Technologies like Network Intrusion Detection Systems (NIDS), Host Intrusion Detection Systems (HIDS), Endpoint Detection and Response (EDR), … allow to identify signs of possible malicious activity within your network, servers and computers. | hid endpoint, endpoint detection | assessment, guidance, network, mri, manage | 1 |
willemssoft.be | Mazethingie is just a little maze game that i created to test out the level generating part of waternet. It generates mazes and it's up to you go from the startpoint to the endpoint of the maze. You can specify a maze size of up to 63x47 which is quite hard to solve if u ask me ! | startpoint endpoint, endpoint maze | level, file, program, cheat, little | 1 |
abramovicmarina.be | In 1988, Ulay and Abramovic decided to end their relationship and to mark this with a performance, which became the legendary endpoint of their collaboration. After years of negotiations with the Chinese authorities, the artists got the permission to carry out 'The Lovers: The Great Wall Walk', in… | legendary endpoint, endpoint collaboration | artist, form, lover, walk, wall | 1 |
zebrafishlab.be | We are equipped with a professional zebrafish breeding facility, various microscopes and imaging equipment, a zebrafish larvae tracking device and all necessary equipment for measuring various molecular, biochemical, physiological and organismal endpoints, both in zebrafish larvae as well as in… | organismal endpoint, endpoint zebrafish | research, integrate, veterinary, academic, biology | 1 |
ng-networks.be | I am no stranger to maintaining and managing Windows based servers. Working on DCs, FSs, Exchange servers etc. is a daily recurrence. This includes things like access rights management and user and endpoint management. | user endpoint, endpoint management | skills, engineer, present, network, thing | 1 |
nuino.be | I also worked on full video network migrations: Endpoints, VCS Control, VCS Expressway, TMS, MCU. I am also currently leading video network migration for a belgian multinational and working on telepresence solution software upgrade for another custmer. I am also busy daily on support for different… | migration endpoint, endpoint vcs | cisco, curriculum, routing, network, migration | 1 |
kiefer-beernaert.be | Testing api endpoints in Java with Rest Assured. Performance testing with JMeter in combination with Chronograf and InfluxDB. Set up automated security testing in Java with OWASP Zed Attack Proxy. Regression testing on existing systems using a Optimized Waterfall method with Selenium in Java in… | api endpoint, endpoint java | automation, apply, current, java, setup | 1 |
marcbogaerts.be | …behind the application. To do this, let’s try to enter some query parameters in the url and see what the answer is. To make the api requests, we will use postman . The javulna code contains a postman collection with useful requests to access the different endpoints that the application exposes. | different endpoint, endpoint application | exercise, vulnerability, query, request, java | 1 |
kvmglobal.be | …over IP can be combined arbitrarily in the KVM Matrix Switching System (no matter if redundant, uncompressed, PoE ) and all KVM Extenders can be used with standard network components in the KVM Matrix Switching System. superfast Switching up to 2000 endpoints and more (expandable endpoints). | superfast endpoint, endpoint expandable | kvm, extender, market, austria, features | 1 |
studio-secure.be | Managed security services protect 24 hours a day, every day of the year, providing constant visibility into security across a myriad of endpoints. | secure, penetration, advanced, compliance, vulnerability | 1 | |
xid.be | F-Secure blocks the new attack that spreads like May’s historic WannaCry outbreak. F-Secure endpoint products offer protection against the Petya attack on several layers to ensure that the attack can be stopped in multiple points during the attack chain: | secure endpoint, endpoint product | attack, attacker, secure, cyber, target | 1 |
brainpowerproductions.be | Webhooks notify you, another person or system when resources have changed by calling a given HTTP endpoint. | power, static, developer, person, resource | 1 | |
alexvanderbist.be | If you've ever worked on any medium sized API I'm sure you quickly discovered a lot of frequently occurring patterns. Parsing the query string, retrieving necessary models, filtering, sorting, adding pagination and finally encoding the data as JSON. Creating a new endpoint quickly becomes an… | new endpoint, endpoint quickly | laravel, june, migration, lot, repository | 1 |
hicu.be | Docker controls the IP address assignment for network and endpoint interfaces via libnetwork’s IPAM driver(s). On network creation, you can specify which IPAM driver libnetwork needs to use for the network’s IP address management. Libnetwork’s default IPAM driver assigns IP addresses based on its… | network endpoint, endpoint interface | docker, networking, network, linux, interface | 1 |
influencair.be | …measurements through hackAIR Tim Cassiers – Air quality projects by BRAL, a citizen movement in Brussels Olav Peeters – Hosting open data endpoints at IRCEL-CELINE serving air quality data from the three Belgian regional government measurement networks Thomas Duvivier – The potential impact… | data endpoint, endpoint ircel | frequently, citizen, tuesday, accuracy, june | 1 |
re-place.be | DARTpaths is an an integrative app to support the prioritisation of chemicals. The Open Source R shiny application allows for the prediction of compound-induced molecular mechanisms of action. The tool integrates phenotypic endpoints of different species induced by compounds and genetic variants, in | phenotypic endpoint, endpoint different | university, method, internally, research, antwerp | 1 |
ransomwaresummit.be | During the event various speakers from a large number of business fields will share their thoughts. This allows us to look at cybersecurity from every angle: insurance matters, police prevention strategy, best endpoint protection, creating awareness, etc. | good endpoint, endpoint protection | summit, organization, antwerp, cyber, topic | 1 |
432evo.be | transports. The Master also competes against more expensive server without effort. All models support Roon latest version (full Roon, not just an endpoint) and Logitech Media Server and switch between both in 10 seconds. With a bit perfect TEAC rip drive , up to 8TB SSHDD , Real-time Kernel , 10… | roon endpoint, endpoint logitech | music, bit, core, linear, power | 1 |
rectoversoprojects.be | …insights in resilience, thresholds and tipping points for species, communities and ecosystems are of paramount importance. Addressing these endpoints is however highly complex, and requires robust, interdisciplinary and collaborative research networks to progressively reach a holistic… | importance endpoint, endpoint highly | research, ecosystem, southern, ocean, change | 1 |
apotheekbalans.be | This is a sample application that deploys seamlessly into the Gruntwork Reference Architecture and demonstrates many important patterns you may wish to follow in your own apps, such as how to: | check endpoint, endpoint load | sample, aws, docker, microservice, example | 0 |
peter-vanhemelryck.be | Tech Corner… | tech, core, head, access | 0 | |
deltalink.be | Deltalink is a Value-Add Distributor of networking, data communication and cybersecurity solutions. | endpoint protection | networking, value, distributor, manage, pre | 0 |
seanvanloon.be | SVL Consulting… Work Experience… Certification… Hobbies… Contact… Scroll For More… Back to… | endpoint protection | engineer, network, certified, azure, industry | 0 |
tunecom.be | How to create a Windows Server 2022 (AVD) image with Azure Image Builder and deploy it to Azure Virtual Desktop | endpoint management | azure, virtual, environment, vmware, workplace | 0 |
wannacry.be | The Petya ransomware , also known as Petwrap, is ransomware and works very differently from any other ransomware malware. Unlike other traditional ransomware, Petya does not encrypt files on a targeted system one by one. Instead, Petya reboots victims computers and encrypts the hard drive's master… | example endpoint, endpoint protection | network, file, attack, advice, help | 0 |
prodata-systems.be | Prodata Systems is a Belgian IT integrator that has been managing complex and business critical environments for many years. We guarantee optimal flexibility in meeting your most demanding requirements, and by partnering with state of the art vendors we ensure continuity and security of your IT… | endpoint protection | network, assessment, vulnerability, networking, demand | 0 |
bittich.be | I'm an experienced Senior Full-stack developer with strong Java and JavaScript knowledge. I'm comfortable performing in fast-changing, result-driven environments within the web application domain. I'm always eager to learn new technologies and adapt myself quickly into a new environment… | sparql endpoint | java, technology, developer, apache, environment | 0 |
ittec.be | Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel¬†Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a. Vestibulum ante ipsum primis in faucibus… | endpoint security | eget, donec, vivamus, malesuada, magna | 0 |
foxandfish.be | Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated. | endpoint beveiliging | checkbox, month, plugin, category, duration | 0 |
on365.be | When starting a pilot for Hybrid Azure AD join, it can be useful to keep track of the number of devices that currently are already Hybrid Azure AD joined. The most straight-forward way to do so is within the GUI of the Azure AD portal: However, when used for reporting... | endpoint security, cloud endpoint | azure, exchange, messaging, connect, scripting | 0 |
tdblog.be | Unlike traditional infrastructures, Hyper-converged infrastructures (HCI) are software-defined, creating a next generation data center foundation that’s even more cost-efficient, resilient, and adaptable to changing business scenarios. The do-it-yourself approach to hyper-converged infrastructures… | endpoint solutions, accessory endpoint | general, refresh, confidence, truly, supply | 0 |
larsveelaert.be | Design your systems to lower data and network risk, improve security, and enable innovation and growth. | infrastructure endpoint, endpoint security | ipsum, sit, consectetur, amet, dolor | 0 |
jefferies.be | …variables within Apex , it will incorporate a lot from previous blog posts but I will try and point you toward these other posts when necessary. Lets Begin: We start off by creating a simple GET table that pulls through our substitution variables from Planning, I covered this in an older post… | url endpoint | oracle, access, march, share, june | 0 |
mydnic.be | Laravel Console Command to Automatically Restore a Backup from Spatie Laravel Backup Package | laravel, php, ago, month, dynamic | 0 | |
meanit.be | Meanit is a vendor agnostic ICT solutions integrator that builds secure and reliable network solutions. We also protect the confidentiality, integrity and availability of information systems. Our mission is to secure your network infrastructure and protect your confidential information. | network, access, line, migration, assessment | 0 | |
fossaert.be | This entry was posted in Poland and tagged bridge , Father Bernatek , Jerzy Kedziora , kazimierz , krakow , modern art , podgorze , Poland , sculpture on | poland, entry, polish, record, old | 0 | |
jensdufour.be | Home… Events… About Me… RSS… Privacy Policy… To the top ↑ Up… | cloud endpoint, endpoint technical | enthusiast, tech, technical | 0 |
kappadata.be | Are you looking for network infrastructure, security and IoT solutions for your company or customers? Welcome to Kappa Data, your value-added distributor for IT. | endpoint security | network, iot, value, distributor, request | 0 |
orlox.be | The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third… | purpose, workplace, access, preferences, engineer | 0 |