Domain | Excerpts relevant to keyword: endpoint | Related expressions | Other expressions from the websitee | Relevance |
---|---|---|---|---|
atbash.be | When you don’t use any annotation on the JAX-RS method with Payara Micro and Spring Boot, no role is required, only a valid JWT token. But with Quarkus, when not specifying anything, the endpoint becomes publicly accessible. This is not a good practice because when you as a developer forget to put… | connect endpoint, endpoint runtime, role endpoint, endpoint example, quarkus endpoint | kotlin, token, framework, runtime, example | 26 |
lousec.be | Azure Active Directory , Community event , Microsoft Defender for Endpoint , Microsoft Defender for Office , Microsoft Sentinel | defender endpoint, endpoint custom, endpoint new, endpoint microsoft, endpoint auditing | microsoft, defender, auditing, custom, sentinel | 25 |
erfgoedbanklandvandendermonde.be | CTRL + Left click : adds one or more endpoints, extended from the range of the last selected endpoint | floor endpoint, endpoint underneath, middle endpoint, select endpoint, ctrl endpoint | path, ctrl, node, scene, collision | 14 |
jensdufour.be | a cloud-based symphony of endpoint management and security. Imagine a conductor orchestrating a harmonious blend of user access, app management, and device wizardry across a cosmic array of gadgets. We’re talking mobile devices, desktops, and even those elusive virtual endpoints (dare me to talk […] | cloud endpoint, endpoint time, symphony endpoint, endpoint management | cloud, intune, device, android, microsoft | 13 |
keysec360.be | BASIC + EDR: We extend the existing antivirus on all users’ computers with a managed endpoint threat hunting agent . | advanced endpoint, endpoint protection, edr endpoint, endpoint detection, computer endpoint | security, vulnerability, package, continuous, firewall | 11 |
iseecure.be | Endpoint Detection & Response: Detect advanced attacks by continuous monitoring of endpoint file and process activities | advanced endpoint, endpoint detection, visibility endpoint, endpoint network, monitor endpoint | response, security, remediation, soc, detection | 5 |
secwise.be | Many organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against... | wip endpoint, endpoint dlp, insight endpoint, organisation endpoint, endpoint detection | security, microsoft, cloud, azure, cyber | 4 |
oscc.be | Microsoft Endpoint Manager (MEM) Co-Management and ConfigMgr cloud attach are game-changers in the realm of mature IT management, offering a comprehensive su... | microsoft endpoint, endpoint manager | mem, window, control, defender, friday | 3 |
mc2mc.be | Where we focus on Endpoint Management, and Security. Navigating through M365, Enterprise Mobility Suite, and security features like Microsoft Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps, we’ve got your digital fortress covered! | endpoint security, defender endpoint, endpoint defender | cloud, speaker, microsoft, community, security | 3 |
nomios.be | Almost 70% of breaches start from endpoints, highlighting the need for robust security measures, such as XDR. | breach endpoint, endpoint need | network, security, technology, secure, enterprise | 3 |
ways2work.be | …in a traditional way using on premise tooling’s and approaches. On the contrary: companies need to adhere a Cloud first strategy for their endpoint deployment and management to face the challenges of tomorrow . Ways2Work helps companies to realize this fundamental change. Whether you want to… | strategy endpoint, endpoint deployment, unify endpoint, endpoint management | workplace, approach, technology, future, career | 2 |
pro-spinoza.be | This manuscript summarizes the professional panel discussions as consensus suggestions centered on populations and endpoint definitions; it isn’t exhaustive or restrictive, however designed to stimulate HF medical trial innovation. Murray Sidman’s (1960) Ways of Scientific Analysis: Evaluating… | population endpoint, endpoint definition | kit, scientific, laboratory, supply, plasmid | 2 |
mathiaspetit.be | Skilled in Microsoft Defender via Microsoft Endpoint Manager and Security Center. Managed configurations and investigated security alerts for effective threat detection and response. | complete endpoint, endpoint setup, microsoft endpoint, endpoint manager | azure, network, microsoft, infrastructure, efficient | 2 |
element61.be | …fee, however OpenAI models are all behind a REST API which sooner or later you as an AI Developer will face some limitations. Whether you use OpenAI public endpoints or Azure OpenAI Endpoints, in both flavors the models are exposed as REST API and the limitations in terms of scaling are the same. | public endpoint, endpoint azure, openai endpoint, endpoint flavor | analytic, qlik, insight, science, competence | 2 |
sentences.be | Microsoft Intune integrates with other Microsoft products such as Microsoft Endpoint Manager, Microsoft 365, and Azure Active Directory, providing a comprehensive solution for managing and securing devices and applications in the cloud. | microsoft endpoint, endpoint manager | microsoft, sentence, intune, consulting, file | 1 |
alexvanderbist.be | If you've ever worked on any medium sized API I'm sure you quickly discovered a lot of frequently occurring patterns. Parsing the query string, retrieving necessary models, filtering, sorting, adding pagination and finally encoding the data as JSON. Creating a new endpoint quickly becomes an… | new endpoint, endpoint quickly | laravel, server, migration, private, night | 1 |
432evo.be | transports. The Master also competes against more expensive server without effort. All models support Roon latest version (full Roon, not just an endpoint) and Logitech Media Server and switch between both in 10 seconds. With a bit perfect TEAC rip drive , up to 8TB SSHDD , Real-time Kernel , 10… | roon endpoint, endpoint logitech | evo, music, streaming, audio, core | 1 |
kiefer-beernaert.be | Testing api endpoints in Java with Rest Assured. Performance testing with JMeter in combination with Chronograf and InfluxDB. Set up automated security testing in Java with OWASP Zed Attack Proxy. Regression testing on existing systems using a Optimized Waterfall method with Selenium in Java in… | api endpoint, endpoint java | testing, automation, security, resume, apply | 1 |
ransomwaresummit.be | During the event various speakers from a large number of business fields will share their thoughts. This allows us to look at cybersecurity from every angle: insurance matters, police prevention strategy, best endpoint protection, creating awareness, etc. | good endpoint, endpoint protection | summit, cyber, cybersecurity, organization, speaker | 1 |
she-consulting.be | Employ our guidance in designing your study down to the finest details, including clinical endpoints, PROMs and resource utilization | clinical endpoint, endpoint prom | economic, consulting, health, analysis, statistical | 1 |
kvmglobal.be | …over IP can be combined arbitrarily in the KVM Matrix Switching System (no matter if redundant, uncompressed, PoE ) and all KVM Extenders can be used with standard network components in the KVM Matrix Switching System. superfast Switching up to 2000 endpoints and more (expandable endpoints). | superfast endpoint, endpoint expandable | kvm, extender, system, matrix, global | 1 |
daedeloth.be | …the concept of a ‘user’, as user project models are sent in events and follow the same logic as any other event property. So I created an API endpoint that would show me all consents in a given project by a given project model. By adding this call to my registration process I was able to ask all | api endpoint, endpoint consent | number, game, hour, card, revenue | 1 |
asp.be | We fortify cybersecurity with advanced firewall solutions, granting meticulous control over network access. Use next-gen threat intelligence , proactively identifying and neutralizing dynamic cyber threats. Implement endpoint protection for real-time threat detection and agile response strategies… | threat endpoint, endpoint protection | asp, servicenow, automation, cloud, network | 1 |
spinae.be | Technologies like Network Intrusion Detection Systems (NIDS), Host Intrusion Detection Systems (HIDS), Endpoint Detection and Response (EDR), … allow to identify signs of possible malicious activity within your network, servers and computers. | hid endpoint, endpoint detection | security, ot, guidance, penetration, manage | 1 |
rectoversoprojects.be | …insights in resilience, thresholds and tipping points for species, communities and ecosystems are of paramount importance. Addressing these endpoints is however highly complex, and requires robust, interdisciplinary and collaborative research networks to progressively reach a holistic… | importance endpoint, endpoint highly | research, southern, ocean, change, global | 1 |
zebrafishlab.be | We are equipped with a professional zebrafish breeding facility, various microscopes and imaging equipment, a zebrafish larvae tracking device and all necessary equipment for measuring various molecular, biochemical, physiological and organismal endpoints, both in zebrafish larvae as well as in… | organismal endpoint, endpoint zebrafish | research, zebrafish, biology, veterinary, academic | 1 |
netaxis.be | Call Admission Controls provided by SRE lets us place limits on customers across multi-tenant systems such as Microsoft Teams. If a customer buys ten Teams channels, SRE will limit this in both directions, something which previously was much more difficult with such a dispersed range of endpoints.” | voice, network, number, automation, process | 1 | |
willemssoft.be | Mazethingie is just a little maze game that i created to test out the level generating part of waternet. It generates mazes and it's up to you go from the startpoint to the endpoint of the maze. You can specify a maze size of up to 63x47 which is quite hard to solve if u ask me ! | startpoint endpoint, endpoint maze | game, level, puzzle, file, screenshot | 1 |
aboutit.be | From your policies to your network security to all endpoints everywhere in the world, we make sure that its one big secure ecosystem. | security endpoint, endpoint world | cloud, microsoft, optimization, process, infrastructure | 1 |
secureness.be | Our Vulnerability Management-as-a-Service includes real-time, 24/7 assessments for all servers and endpoints, ensuring all vulnerabilities are reported to make sure you can enhance your organization's security posture. | server endpoint, endpoint vulnerability | vulnerability, cybersecurity, soc, security, penetration | 1 |
marcbogaerts.be | …behind the application. To do this, let’s try to enter some query parameters in the url and see what the answer is. To make the api requests, we will use postman . The javulna code contains a postman collection with useful requests to access the different endpoints that the application exposes. | different endpoint, endpoint application | database, exercise, vulnerability, query, request | 1 |
brainpowerproductions.be | Webhooks notify you, another person or system when resources have changed by calling a given HTTP endpoint. | brain, static, automate, hello, great | 1 | |
studio-secure.be | Managed security services protect 24 hours a day, every day of the year, providing constant visibility into security across a myriad of endpoints. | secure, security, penetration, advanced, compliance | 1 | |
prodata-systems.be | Prodata Systems is a Belgian IT integrator that has been managing complex and business critical environments for many years. We guarantee optimal flexibility in meeting your most demanding requirements, and by partnering with state of the art vendors we ensure continuity and security of your IT… | endpoint protection | system, network, security, care, critical | 0 |
jefferies.be | …the variables for the whole application ? Apex could work well as a solution to this problem. Using Apex we can restrict the tables that use our Rest API web source modules to only show substitution variables that meet a certain criteria , for instance only pull through those from a certain Plan… | url endpoint | apex, cloud, epm, oracle, api | 0 |
netleaf.be | Netleaf’s Cyber Defence Center serves as your guardian angel, providing nonstop security monitoring, detection, and response services to safeguard your business against potential threats. | endpoint security | security, cyber, center, defence, compromise | 0 |
michielevers.be | Hi, I'm Michiel! I hack your systems and applications,so that others won't. About myself I'm a seasoned penetration tester with more than seven years of experience in cyber security and have completed numerous assessments for customers. I'm a continuous learner and I'm always interested in new… | api endpoint, endpoint logical | security, penetration, cyber, assessment, consultant | 0 |
comlink.be | We provide consultancy on Windows and Linux system administration along with Project Management and Development on site. | endpoint security | security, consultancy, cloud, backup, infrastructure | 0 |
exabyte.be | © All rights reserved - Exabyte BV - Privacy & Cookie Policy | manage endpoint, endpoint detection | manage, backup, print, network, cloud | 0 |
bittich.be | in fast-changing, result-driven environments within the web application domain. I'm always eager to learn new technologies and adapt myself quickly into a new environment. Knowledge sharing and provide internal coaching to the teams for building better products is exactly what I'm all about. | sparql endpoint | java, developer, apache, knowledge, environment | 0 |
hksolutions.be | HK Solutions… Home… Cyber Nieuws… Contact… | cyber, security, industry, productivity, microsoft | 0 | |
shiftz.be | Contacteer… privacy policy… Privacy Policy… Cookie… | microsoft endpoint, endpoint manager | manager, citrix, avd, fat, microsoft | 0 |
devso.be | Looking for an integration for your CYOD or BYOD? Would you like to start with a Flex Reward or Cafeteria Plan? Would you like to purchase devices for your employees? Be sure to contact us and we will come up with an affordable solution together. | endpoint manager, endpoint consultant | device, flex, reward, recycle, employee | 0 |
peter-vanhemelryck.be | Tech Corner… | tech, corner, admin, core, cloud | 0 | |
tunecom.be | How to create a Windows Server 2022 (AVD) image with Azure Image Builder and deploy it to Azure Virtual Desktop | endpoint management | azure, cloud, virtual, window, desktop | 0 |
v-infra.be | v-Infra provide fully managed infrastructure solutions that can integrate with your own solutions. Backup, Remote Access, Monitoring, Helpdesk, Cloud Tenant management, ... | cert endpoint, endpoint hardware | offer, security, cloud, backup, monitor | 0 |
on365.be | When starting a pilot for Hybrid Azure AD join, it can be useful to keep track of the number of devices that currently are already Hybrid Azure AD joined. The most straight-forward way to do so is within the GUI of the Azure AD portal: However, when used for reporting... | endpoint security, cloud endpoint | azure, microsoft, exchange, cloud, security | 0 |
interligo.be | Our end to end managed service offering provides customers with an SLA and KPI driven agreement that enables their own organization to focus on their core business. | network, technology, switch, need, infrastructure | 0 | |
kappadata.be | Our attractive product portfolio is backed up by our strong technical and commercial expertise and support. Whether it concerns networking, security or IoT, Kappa Data always has a contact person on hand for all your technical questions. | endpoint security | security, kappa, network, iot, value | 0 |
ecomit.be | ECOMIT | We make IT happen! | modern endpoint, endpoint server | cybersecurity, server, select, print, defense | 0 |
interit.be | 365… Microsoft Teams… Call Connect… store… Servers en storage… Back-up en disaster recovery… Public en… | endpoint protection | zero, microsoft, connect, store, secure | 0 |
mydnic.be | Web Development 102 Personnal 56 Cinema 53 Domotic 10 Music 10 Quotes 10 Recipes 7 Games 5 Management 3 | laravel, quote, ago, dynamic, startup | 0 |