Domain | Excerpts relevant to keyword: security | Related expressions | Other expressions from the websitee | Relevance |
---|---|---|---|---|
0110.be | In an attempt to make maintenance of these services more manageable we are in the process of containerizing our software. Running software in containers has advantages . One of the advantages is a guaranteed consistency across environments. Also, isolated software containers can be beneficial for… | beneficial security, security stability | ghent, fig, javascript, system, user | 1 |
10wtac.be | The insignia shown here are worn exclusively by this wing and its flying squadrons (23rd Squadron, 27th Squadron, 31st Squadron, 349th Squadron, B-Flight & Operational Conversion Unit) and by its Support units. | strike security, security squadron, security flight | squadron, wing, patch, tactical, flight | 0 |
2housesblog.be | …provides the opportunity to have consistent involvement and support from both parents, contributing to their emotional well-being and sense of security. This shared responsibility also encourages effective communication and cooperation between parents, promoting a more harmonious co-parenting… | sense security, security responsibility, stability security, security parent, security additionally | child, holiday, parenting, season, family | 3 |
3520.be | Hello world!… By… | yacht, berth, price, hello, crew | 0 | |
365bythijs.be | I am excited to share that I have been chosen as the discussion leader for Automation and SOAR within the Microsoft Security CCP. The Microsoft Security Customer Connection Program or … Continue Reading Discussion Leader for Automation and SOAR in Microsoft Security CCP | ai security, security space, microsoft security, security copilot, copilot security | azure, microsoft, sentinel, automation, key | 19 |
36win.be | The 36win name is synonymous with security, trustworthiness and amusement. You're sure to find your new favourite game among our range of online casino games. Dice games, dice slots, card games, jackpot, blackjack, poker, and so on. There is a huge range to choose from. It's easy to play the games… | casino security, security reliability, synonymous security, security trustworthiness, game security | hot, game, previous, exclusive, simply | 4 |
4bowl.be | …a lane in your bowling facility online via their smartphone, tablets and computers. Make all your services like bowling , billiards , skittles , tennis , squash , badminton , as well as lasertag , indoor playgrounds , kart , racing simulators , trampoline park , minigolf or escape rooms available… | reservation, system, center, bowl, simulator | 0 | |
4c-foresee.be | Through strong partnerships, knowledge is brought closer to the customer. From security (incl. cybersecurity, GDPR, ...) to data center optimization (incl. cloud computing). | customer security, security incl | centric, interim, manager, advisory, trust | 1 |
4ginstellingen.be | Brandwering… Login… Contact… [email… | bio security, security services | meer, reserve | 0 |
4s.be | 4S Risk is specialized in risk analyses, audits and advice related to fire protection, loss prevention, burglary security, business interruption and other potential hazards to which businesses are exposed. | burglary security, security business, safety security, physical security, security loss | risk, fire, control, analysis, insurance | 3 |
4stroke.be | I have found a few (10 in total) frame numbers for the Honda SS50 which may help you in determining the age of your Honda and getting the right papers for it. Fo have a search in the database! :) | number, manual, frame, list, chart | 0 | |
5bestedatingsites.be | No Mobile App. For some, this can be considered as a limitation, but on the other hand this offers discretion, security and safety | discretion security, security safety | visit, uk, user, advisor, easy | 1 |
5grandplace.be | With its stunning lounges and breathtaking views of the main square of Brussels, this unique setting is without a doubt an unmissable new venue for all your future events! | security guard | view, exceptional, nd, venue, breathtaking | 0 |
5oceans.be | Creating security and continuity towards livelihood for a vulnerable group of people with invaluable knowledge and understanding of fishing is a pillar of our business. The production unit therefore wants to be BSCI-certified (Business Social Compliance Initiative) and wants to set up its own… | fish, ocean, fresh, fishing, nl | 1 | |
7hill.be | Discover 7HiLL, a dynamic and results-driven services company in information & communications technology (ICT) that listens to YOUR real business needs first! | security compliance | technology, hill, enterprise, result, strategic | 0 |
7wdata.be | Get your dream job or find the white raven in Artificial Intelligence, Data Science, Big Data, Analytics and Data Management. | cyber security, security engineer | generative, big, mar, thing, power | 0 |
9design.be | An electric lock that you can slide into each other. There is always one basic lock. Then you choose whether it is | lock, electric, profile, controller, gallery | 0 | |
a-smart-office.be | Our reason of being is to enable you to improve your performance by combining our expertise in all areas relating to the office, in order to offer you global optimization solutions. | datum security | smart, print, infrastructure, society, area | 0 |
aa-security.be | We replace your door cylinder with a German brand ultra high security model (Wink Haus) equipped with a danger function. | range security, security service, high security, security model, function security | locksmith, key, fast, price, night | 23 |
abc-recruitment.be | … | enterprise security, security architect | recruitment, sale, engineer, analyst, manager | 0 |
abccontracting.be | Access to affordable and dependable energy is critical for energy security and economic prosperity. Our solution is the best investment possible to meet all your power demands while respecting the environment. Your costs savings and the protection of our planet are our priority! | energy security, security economic | power, grid, thermal, solar, activity | 1 |
abcmbs.be | Renovation of office containers, transformation of old production areas into offices and canteens (modular partitions, custom-made kitchens and furniture, paint, false ceilings, air-conditioning, electricity, flooring, new sanitary facilities, etc.) .) | floor, industrial, ceiling, room, area | 0 | |
abconcerts.be | …More news… Win 1 year of free concerts at AB WED 22 MAY 24 | Stories… Paint this wall WED 5 JUN 24… | story, jun, answer, search, technical | 0 | |
abilio.be | Airline companies and airports have various ways of offering their passengers a more comfortable journey: lounges, e-tickets, separate check-in desks, online check-in. However, did you know that many travelers are unaware of the airport security? This security causes great discomfort and stress… | airport security, security great, security stress, experience security, security control | passenger, airport, industry, aviation, airline | 5 |
abjoy.be | CREATION 2025 - The magic of listening to each other, of looking at each other, the magic of rediscovering each other in the exchange, the magic of being able to acknowledge fears and explore desires, of creating a zone of comfort and security for all three of us – That‘s the magic we want in our… | comfort security, security magic | joy, queen, dyane, bee, paradise | 1 |
aboutit.be | We prioritize our clients… So much so, it got to Microsoft’s notice. You’d never find a more dedicated team of IT experts commited to your business growth and security in Belgium. | network security, security endpoint, growth security, security belgium | cloud, microsoft, optimization, process, infrastructure | 4 |
abss.be | 🔐 Robust Security and Compliance: Rely on Microsoft Azure’s stringent security and compliance frameworks to safeguard your data. | robust security, security compliance, stringent security | analytic, sap, advanced, fabric, microsoft | 2 |
account-partner.be | High quality counselling, an impeccable follow-up of your file, all our expertise in the service of your interests and the total guarantee of maximal legal security. | financial, tax, trust, empower, goal | 1 | |
acensi.be | To support its growth, ACENSI Belgium relies on the know-how and expertise of the ACENSI Group, which for the past 20 years has been assisting more than 90 key accounts in France and abroad in the management of their IT projects by offering solutions and managed services. | agility security | offer, join, energy, check, spontaneous | 0 |
achillex.be | Identify weaknesses in your applications and infrastructure by means of extensive (recurring) security tests. Whether you want to test your new online web application, or perform a thorough security review of your company network, we will identify the weaknesses and help you mitigate them. | passion security, security run, critical security, security issue, lead security | organization, threat, infrastructure, risk, landscape | 13 |
acompio.be | Retail Services: Retail: Retail excluding motor vehicles: Retail clothing, pharmaceutical products and auxiliaries: Retail trade services of clothing | rocket security, security system | city, market, directory, category, phone | 0 |
actia.be | That Actia Telematics Services is part of the global and family-owned Actia group brings a lot of value to our users and integrators. | family, telematic, need, automotive, standard | 0 | |
adalta.be | We maintain and backup your data every day. We take all necessary preventive measures to ensure the security of your data. | security datum, measure security | need, custom, current, relationship, preview | 2 |
adamserrurier.be | We open locked doors, doors locked with the key on the inside, including armour-plated security doors. | armour security, security door | repair, shoe, locksmith, key, lock | 1 |
adelinabajrami.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | lorem, ipsum, industry, research, text | 1 |
adiict.be | PERITAS is a dynamic consultancy firm specializing in energy projects, coordination of security and stability studies. | coordination security, security stability | server, desktop, asterisk, center, technology | 1 |
adin.be | Home | Site Security | Why Adin | Track your order | Terms And Conditions | Contact Us | Sitemap | site security, security adin | jewelry, antique, estate, enamel, earring | 1 |
adochs.be | The Digital Mathematics Research Group (DIMA) of the Department of Mathematics at the Vrije Universiteit Brussel (VUB) specializes in the mathematical foundations for digital data acquisition, representation, analysis, communication, security and forensics. Within this project we will develop… | communication security, security forensic | cultural, heritage, digitalization, output, auditing | 1 |
adrit.be | Experience as a team leader with internal and external people and as a project manager of onsite and remote teams with multifunctional skills for infrastructure and security projects. Strong in planning, reporting, fast learning, certified in ITIL foundation as well as PRINCE2, COBIT 5 and SCRUM… | infrastructure security, security project | delivery, network, sap, consulting, past | 1 |
advitech.be | … | consulting, network | 0 | |
advocaatreulens.be | Advocaat Reulens provides innovative and affordable smart legal solutions through the use of technology and experienced professionals with +20 years of experience. | maximum security, security datum | reulens, legal, smart, specialization, technology | 0 |
advoring.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | cost, firm, law, fee, analytic | 1 |
ae.be | Develop new digital solutions and improve the quality, security & integration of your applications. | quality security, security integration, cyber security, security compliance | ae, strategy, cloud, advice, strategic | 2 |
aertssammy.be | We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings. | domain security, security reason, browser security, security setting | setting, domain, previous, able, external | 1 |
aesc.be | AESC is a non-profit think tank originally registered in Belgium as “Africa Economic and Security Council”. | economic security, security council | economic, council, africa, think, late | 8 |
aet.be | …a role in the international supply chain. This includes producers, exporters, forwarders, warehouse keepers, customs agents, carriers and importers who are involved in activities covered by the relevant customs legislation and are eligible in terms of reliability and security in the supply chain. | reliability security, security supply | meer, antwerp, harbor, history, cargo | 1 |
afarax.be | Our mission is to identify, attract and place top professionals in positions where they can thrive. | hire, consulting, staff, opportunity, click | 0 | |
afavor-it.be | Our higly qualified Security Consultants and Ethical Hackers provide the necessary knowledge to help you improving and upgrading your IT Security environment in an efficient way. | security services, security resource, effective security, security audit, speciale security | favor, campaign, resource, environment, necessary | 11 |
affordsol.be | Your privacy and security are assured : I take privacy and confidentiality very seriously and I am more than happy to sign any Non-Disclosure Agreement you may require. | privacy security, security privacy | consulting, report, affordable, vba, fully | 1 |
afgb.be | Tickets will only be issued once ALL guests' names have been registered , for security purposes. See 'booking changes' for more info. | practical security, security reason, name security, security purpose | ball, guest, edition, change, gallery | 2 |
afmaeli.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | employee, approach, organization, manager, process | 1 |
ag-funeral.be | A & G FUNERAL is an experienced 100% Belgian funeral group, offering high-quality funeral services accessible to all. | hygienic security, security reason | funeral, tribute, discover, package, wallonia | 0 |
agisko.be | Enterprise data centers are on-premises facilities owned and operated by a single organization. These data centers are designed to meet the organization's specific needs and provide control over data security, customization, and compliance. | failure security, security breach, center security, security agenda, advice security | center, infrastructure, device, cloud, workspace | 9 |
agoriasirris.be | The EU has recently launched a European Economic Security Strategy & the European Green Deal Industrial Plan. Both initiatives lead to new regulations, new opportunities in European and foreign markets, entail new funds but also fundamentally change the relationship with China. During an hour, we… | economic security, security strategy | presentation, manufacture, legal, ceo, green | 1 |
ai-cu.be | Deep-tech SME rasdaman GmbH is a German independent academic spin-off with mission to commercializing the rasdaman ("raster data manager") datacube technology. Its game-changing Actionable Datacubes┬« paradigm stands out through its flexibility, scalability, security, open standards support (such… | scalability security, security open | gdpr, cube, big, analytic, processing | 1 |
aig.be | In the face of evolving global security threats, keep your business in business and your people safe and secure | global security, security threat | aig, insurance, broker, health, liability | 1 |
aircargosecurity.be | Contact… Downloads en links… | cargo | 0 | |
aiworld.be | Air Force Lt. Gen. Jack Shanahan spoke at the National Security Commission on Artificial Intelligence in Washington. | national security, security commission | computing, artificial, global, edition, click | 1 |
aixineering.be | Structural engineer of concrete structures, airplane hangars, timber constructions, timber houses, industrial halls in germany aachen. | timber, glass, house, steel, system | 0 | |
akala.be | We host your web site or e-commerce on WordPress . It's optimized for mobile (responsive). We take care of security (https) and updates. | care security, security https | gallery, category, user, sidebar, dev | 2 |
alala.be | Institute for for Peace Peace and and Doplomacy Doplomacy --- --- in in search search of of a a european european security security order order after after the the ukraine ukraine war | document security, security assurance, national security, security agency, investigation security | ukraine, evil, war, russia, corruption | 8 |
alarmsolutions.be | Are you looking for a reliable security company in Brussels or elsewhere in Belgium to protect your home or business? Specialized in the installation of certified and high quality alarm systems , we offer you a wide range of services, such as the installation of intruder alarm systems, video… | site security, security system, belgian security, security company, reliable security | system, detection, fire, control, access | 15 |
alcom.be | Alcom electronics offers leading edge technologies and industry firsts as the premier Benelux-focused electronics distributor and representative for electronic components, modules, boards and systems. Synergistic interactions between the complementary product groups brings state-of-the-art… | sea security, security situation | electronic, technology, industry, distributor, representative | 0 |
alexvanderbist.be | Over the last few days we've had a couple of issues with Imagick and processing PDFs on our servers. As it turns out, these issues are caused by automatic security updates. Let's look into the issue and its solution. | automatic security, security update | laravel, server, migration, private, night | 1 |
aligncoaching.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | align, career, warning, necessary, currently | 1 |
alisadvocaten.be | The GDPR (or also General Data Protection Regulation) is about the management and security of personal data of European citizens. | management security, security personal | legal, law, example, practical, theme | 1 |
alldrinks.be | Wines, beers, waters, juices, milk, soft drinks, champagnes, spirits, gift baskets, boxes of beer, spirits, sweet and savoury treats right in the boot of your car! | security guarantee | beer, drink, tea, chocolate, wine | 0 |
allport.be | Our reinforced rail systems and profiles are UNIQUE to the Belgian market. The APO 100R© and APO 100RS© are developed by our own production team. | operator security, high security, security door | apo, dock, facade, wood, quote | 0 |
altecs.be | © 2019 Altecs | Powered by Carambola Webdesign | bv security, security partner, bosch security, honeywell security, samsung security | hour, ter | 0 |
alten.be | We work with key actors in the Aeronautics & Space, Defence & Naval, Security, Automotive, Rail, Energy, Life Sciences, Finance, Retail, Telecommunications, and Services sectors. | defence security, security naval, naval security, security automotive | engineering, woman, story, manager, developer | 7 |
alter-solutions.be | IT Outsourcing and consulting services for Software development, Cybersecurity and Cloud Computing. Nearshore team delivery | information security, security cybersecurity | alter, outsourcing, cybersecurity, computing, cloud | 0 |
alterego-notaires.be | The price is set in front of you through a real-time auction. All the legally required security is provided by the notary, who operates at the heart of the system. In just one click, you can make a firm offer while sitting comfortably at home – no travel required. | legally security, security notary | alter, notary, legal, property, inheritance | 1 |
alternativa.be | Some cookies are essential for you to be able to use all the functionality of our site. They manage user sessions and prevent security threats. They do not collect any personal information. For example, they allow you to add products to your cart and order securely. | session security, security threat | cef, series, energy, functional, cart | 1 |
altstudio.be | Studio… Works… References… Links… Contact… Client… Category… Year… Alt Studio… | security signage | print, language, french, share, editorial | 0 |
amastore.be | Jewelry comes in all shapes and sizes and as jewelry stylists, we realize not everything will look the same on one person as it does another. | pearl, gold, select, diamond, necklace | 0 | |
amberconsult.be | …can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. | legal security, security purpose | amet, lorem, sit, dolor, ut | 1 |
amc.be | The people of AMC support production companies by taking care of their steel construction projects. This way production companies can focus on operating and optimizing their production processes. AMC can handle all kind of challenging steel construction projects, thanks to its multidisciplinary… | industry, steel, erection, furnace, converter | 0 | |
amsab.be | Op Monday 13 May the Belgian Association for Modern History (BVNG) organizes the biennial study day Day of Latest History In Brussels. This year's theme is the history of subaltern groups. Within this topic, Amsab-ISG participates with a session on LGBTI+ in its collection. | social security, security discussion | history, donation, late, heritage, search | 0 |
amtal.be | Amtal Security is a small information security agency specialized in preventing and detecting threats hitting information systems. Our expertize is focused on the technical aspect of the security and our strategy is bottom up. We strongly believe that any security controls should be mapped and be… | amtal security, governance security, security operation, security implementation, grc security | control, operation, integration, governance, risk | 28 |
androme.be | Androme specializes in bespoke software development services, providing comprehensive, end-to-end IT solutions across multiple domains such as retail, telecom, broadcast, e-care, and aviation. Our approach combines high-tech expertise with a focus on security, scalability, and redundancy… | focus security, security scalability | comprehensive, scalability, approach, need, domain | 8 |
anisol.be | Highly skilled professionals in many fields, programing, project management, support, security, account management. all profiles related to the IT industry | support security, security account | consulting, consultant, lorem, ipsum, variation | 1 |
antieke-tuinornamenten.be | As one of the few experts in antique garden ornaments in Belgium we are also pleased to assist you as adviser concerning the storing, restoration, valuation, security and placement of your garden ornaments. | valuation security, security placement | garden, bust, sun, greenhouse, england | 1 |
antisocialsocialclub.be | © 2024, AntiSocialSocialClub Powered by Shopify | security policy | tee, unit, price, hoodie, black | 0 |
antoineblairon.be | I have a large panel of IT skills in management, infrastructure, security and development. | infrastructure security, security development | blairon, skill, resume, discover, profile | 2 |
antwerpmanagementschool.be | Antwerp Management School welcomes Jacques Vandermeiren, CEO of Port of Antwerp-Bruges, as the newest member of its board of directors. His addition emphasizes the close bond between Antwerp Management School, the University of Antwerp and the global ecosystem of the port. It underlines the… | cyber security, security management | program, antwerp, executive, discover, mba | 0 |
antwerpshield.be | SHIELD is an overarching program for a series of current and future Antwerp Police Department initiatives that pertain to the security in the private-public sector in Antwerp. This is a public-private partnership based on information sharing. | initiative security, security private | shield, antwerp, terrorism, share, network | 1 |
anyconnect.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | connect, fiber, necessary, absolutely, basic | 1 |
anymusic.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | music, fiber, connect, necessary, absolutely | 1 |
apalala.be | Human-Centric Security, Belgium, Cyber security, Education, Phishing, Social Engineering, Gamification, security awareness, behaviour, culture, NeuroSecure, Framework, Neurosciences | centric security, security belgium, cyber security, security education, gamification security | behaviour, cyber, awareness, cybersecurity, human | 13 |
apc-center.be | Home… Telenet… One… Internet… Internet & TV… Digital Security… TV & Entertainment… Telenet TV iconic… | digital security | center, apc, telenet, iconic, play | 0 |
apisec.be | The overall goal of the APISEC project is to enable software vendors in the fintech sector to quickly and effectively use complex new technologies in API security as a fundamental lever for their success in the digital economy. The concrete goals of the APISEC project are to broaden the knowledge… | complexity security, security technology, api security, security fundamental | api, package, knowledge, fintech, economy | 3 |
appartementtehuurmarbella.be | Private landscaped sub-tropical gardens // 4 outdoor swimming pools // 500m2 Spa & Fitness Centre // Restaurant // Bar by the pool // Meeting room // Business centre // Gourmet corner and convenience store // Underground garage parking // Kids Club // Wine cellar // Security and 24-hour CCTV //… | cellar security, security hour | hill, accomodation, appartment, room, apartment | 1 |
appmire.be | Appmire offers consulting to clients looking for an expert in the mobile application space. Appmire is specialized in iOS, Android and mobile web-app development. Security, Databases, Open Source and Performance are the main areas of expertise. Jeroen is an Application Architect used to setting up… | development security, security database | user, build, beautiful, integration, backend | 1 |
appsict.be | Our main goal is to give your organisation the apps your employees need. One app at a time, ready-made or custom-made, we take care of your ERP. | sign, eagle, care, journey, previous | 0 | |
aptus.be | We help the client understand the IoT mine field. We have experience in security, provisioning and many more important aspects that will define the cost and recurring investments for the client's IoT journey. Here we will create a feasible IoT architecture to the clients needs. | experience security, security provision | iot, engineering, testing, device, edge | 1 |
apzi.be | Alfapass was developed by Alfapass cvba in order to facilitate the access control of persons to terminals and port facilities, required within the scope of the ISPS-code (International Ship and Port Facility Security Code). The Alfapass-card does not extend an automatic right to accessing the port… | facility security, security code | private, representation, interest, task, road | 1 |
aqua-net.be | AquaNet was founded in the early IT days with the goal providing to the point IT services to small and medium businesses. Our goal is providing robust and stable services that require low maintenance but deal with the current challenges of IT security. | technology, partnership, user, great, tab | 1 | |
arbeidskaart.be | Our company is a recognized service provider by the Belgian Social Security Office for work permit formalities. We will obtain the national number for your employee and submit a work permit application via the government platforms. | social security, security office | permit, blue, card, single, lp | 1 |
arcadelaw.be | At the same time, immigration, employment and social security rules are manifold and highly technical. Increased scrutiny of immigration and international employment means that compliance is more important than ever. | social security, security rule | law, arcade, corporate, global, mobility | 1 |
argentorsafe.be | We offer highly competitive rates and a maximum security. The goods are packed and stored individually per client. | maximum security, security good | safe, metal, precious, deposit, gold | 1 |
argusteam.be | ENGLISH… | team security, security services, integrate security, security management | argus, integrate | 0 |
argusvision.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | argus, analytic, survey, industry, case | 1 |
armatis.be | With thousands of installations within more than 60 years armouring the most sensitive sites, we will always insure that your places and goods will get the highest level of mechanical protection. | metallic security, security constructions, definition security, security construction | sign, mechanical, thousand, equipment, price | 0 |
armes.be | carabines… revolvers… Consulter le catalogue… Carabines… Fusils… Revolvers… | ruger security | colt, smith, ruger, brown, marlin | 0 |
army-shop.be | Contact us… Cart 0 Product Products (empty)… Check out… Proceed to checkout… Home… Grenade… Kimera… | view, quick, add, jr., cart | 0 | |
arnevanderstraeten.be | I graduated as a Computer & Cyber Crime Professional, a bachelors degree in the Applied Computer Sciences, from the Howest University in Bruges (Belgium). | resume, friend, infrastructure, thing, apply | 0 | |
aromabioty.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, paint, necessary, feature, functionality | 1 |
artelis.be | …whereas reducing prices and reagent consumption due to their miniaturization. There is a rising want for sooner and animal-free approaches for drug improvement and security evaluation of chemical substances (Registration, Evaluation, Authorisation and Restriction of Chemical Substances, REACH). | improvement security, security evaluation | serum, cell, protein, innovative, complement | 1 |
artemi.be | Art'émi, luxury jewelery in Brussels, gold and silver jewelery shop for women, men and children: bracelets, necklaces, rings, customised engravings, etc. | necklace, woman, jewelry, silver, chain | 0 | |
artofcreation.be | As you probably know, the users in Management Reporter are actually managed in Dynamics AX by using the role based security of Dynamics AX. The following table shows which roles in AX correspond to which roles in Management report ( Source ). So for example if you want to be administrator in MR… | security network, role security, security dynamic, mr security, security administrator | ax, dynamic, error, pipeline, report | 7 |
artoptimist.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | watch, necessary, absolutely, basic, feature | 1 |
artport.be | IPARC provides a state-of-the-art storage facility and bonded warehouse for art and heritage collections with a professional portfolio of collection services: ARTPORT, located in Kampenhout, Belgium. Over 2000 m2 storage provides both affordable solutions as well as tailor-made secluded storage… | stringent security, security environment | storage, facility, space, heart, tailor | 0 |
arts345.be | Arts 3-4-5 is situated in the well-known European quarter, a stone’s throw from the Madou EC tower and Madou shopping area. The attractive building benefits from excellent transport connections. | hall security, security guard | sqm, space, build, highlight, rental | 0 |
artwhere.be | For more security and upgradability of your computer resources, we suggest that you share them in our Cloud. | user, creation, graphic, responsive, order | 1 | |
asbsecurity.be | ASB Security stands for safety and involvement. The main goal of ASB Security is to make our society a safer place. In order to accomplish this ASB Security offers a set of security services to companies, governments and individuals. In other words: ASB Security is there for everyone, big or… | asb security, security safety, security society, security set, set security | safety, provision, society, order, goal | 31 |
aseva.be | ASEVA’s functioning and the management of the oil security stocks are funded by means of a contribution payable on major oil products put into consumption. | aseva security, security oil, belgian security, oil security, security stock | financial, legislation, storage, general, energy | 3 |
asf.be | Economic, social and cultural rights | Security and freedom | Torture | Congo (the Democratic Republic of the) | Press Release | right security, security freedom | asf, law, republic, uganda, human | 2 |
asfalys.be | At Asfalys, we are passionate about creating innovative solutions and transforming businesses. Since our inception in 2013 by three friends sharing the same values and a common vision, we have consistently evolved to become a leading consulting firm in the field of business management and strategy. | spend security, security crisis | consulting, view, path, inevitable, growth | 0 |
asp.be | ASP propels businesses into a new era of innovation and scalability. Offering a dynamic suite of services, we seamlessly integrate robust infrastructure with advanced analytics and AI capabilities. Elevating data management, we ensure unparalleled security, compliance, and resilience. Embracing a… | network security, security threat, unparalleled security, security compliance, environment security | asp, servicenow, automation, cloud, network | 11 |
asphaliaconsulting.be | As your trusted independent contractor, we understand the unique challenges faced by organizations of all sizes. Our bespoke cybersecurity solutions are meticulously crafted to align with your specific governance needs. From bolstering network security to safeguarding critical data, our services… | information security, provider security, security service, security audit, process security | consulting, governance, risk, compliance, feature | 7 |
astriva.be | Typographic postersPrint DesignView Project… Logo DefensiePrint Design, Digital DesignView Project… | cyber security, security awareness | view, print, toggle, announcement, birth | 0 |
atbash.be | Also, Spring Boot has excellent support for using JWT tokens for the authentication and authorization of rest endpoints. Besides the Spring Boot Security starter, the Oauth2 Resource Server dependency is required within your application. So you don’t need to handle the JWT token yourself in a… | application security, security testing, extend security, security probably, ktor security | kotlin, token, framework, runtime, example | 26 |
ateliercatherinejanssens.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | bow, range, sound, viola, need | 1 |
ateliervierkant.be | Moviri is is a a global global software software and and professional professional services services company company providing providing 19 19 years years of of expertise expertise in in Analytics, Analytics, Performance Performance Engineering, Engineering, IoT IoT and and Security. | relais security | series, private, landscape, garden, house | 2 |
atendo.be | A Team driven by passion in delivering excellent networking & security services. Atendo BV is specialised in the networking & security domain. We maintain, install, design your future office & datacenter networks. | network security, security service, security domain, security services, security passion | network, install, future, domain, tab | 10 |
athena-graphics.be | On the one hand Athena Graphics makes every effort for brand owners to guarantee their visual identity. We ensure consistency and coherence, even if your packaging is produced in different locations and with different printing techniques. On the other hand, printing companies rely on us for more… | datum security, security infrastructure | packaging, graphic, print, artwork, movie | 0 |
atticstudios.be | I do not necessarily want this to be a limiting factor, but my current interest goes out mainly towards solutions to improve privacy and security, and allow reclaiming personal data from third-party-managed cloud services. | privacy security, security personal | attic, automation, pi, raspberry, adventure | 1 |
au-repos-des-chasseurs.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, seminar, reservation, absolutely, basic | 1 |
aubergedebouvignes.be | A room with a king size bed, a room with two single beds, and a bathroom of 17 sqm with shower and bath, for four people. | modern security, security pleasure | room, history, booking, gallery, size | 0 |
audiaplastics.be | Vulnerable Domains: Major domains where anyone can register the domain name. No check is made by the registry to verify the applicants right to use the name. | dns security, security extensions | domain, list, american, package, ip | 0 |
audit-academy.be | We are coaching internal audit departments on multiple subject matters: internal audit, risk, information technology, privacy, security... Don't hesitate to contact us for more information. | privacy security, security information | risk, academy, qualified, competence, control | 1 |
autobekledingloockx.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | gt, romeo, meer, necessary, develop | 1 |
automotivesystems.be | iReach is a DMS system (Dealer Management System) that allows car dealers to monitor their operations at all times. | system, automotive, sale, operation, available | 0 | |
autosecurite.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
auxhirondelles.be | Enjoy a minimum stay of 2 nights, for a duration of your choice, with arrivals from Monday to Saturday. Book now in complete security and receive immediate confirmation to plan your stay with peace of mind. | complete security, security immediate | ideal, cottage, walk, pm, lover | 1 |
auxility.be | To help you secure your end users and lower the risk of getting a breach at that level, we promote Keeper Security as a Password Management solution. | keeper security, security password, manual security, security check | user, patch, asset, password, server | 4 |
avenslegal.be | Commercial law, corporate law, law of associations and foundations See details Intellectual property law See details Labour and social security law See details Local taxation and tax litigation See details Real estate and administrative law See details Class actions See details Private law See… | social security, security law | legal, firm, law, global, career | 1 |
avercon.be | Although each project is different and our mission is to always achieve new and the best innovative solutions , our approach is embedded in a carefully expanded machine building expertise. Quality, reliability and operational security have the highest priority. The experience we have built up in… | operational security, security high | automation, packaging, future, proof, engineer | 1 |
avolink.be | Unique partnership of lawyers – Lawyers who excel in their profession – Your experienced legal service provider | social security, security law | law, lawyer, area, network, antwerp | 0 |
aw-law.be | Ann is an expert in employment, labour and social security law. The 2021-2022 edition of The Best Lawyers™ recognizes Ann as the 2021-2022 “Lawyer of the Year” in labor and employment law. | social security, security law | law, aw, attorney, employment, legal | 1 |
awarity.be | …tests, our platform enables businesses to cultivate a culture of awareness and resilience against cyber threats. From the educational aspect of security awareness training to the practical insights of penetration tests, Awarity offers the necessary tools to elevate digital security and safeguard… | awarity security, security awareness, campaign security, security analysis, aspect security | awareness, campaign, pentest, cybersecurity, schedule | 14 |
awdc.be | …Process , in the Compliance section, file your online AML declaration and link up with the KYC database . Stay tuned in to the City's upcoming Diamond Year and learn about the unique diversity of our community . Keep your finger on the pulse on the services of the dedicated ADA Security Office . | ada security, security office | diamond, antwerp, calendar, kyc, community | 5 |
axcite.be | Microsoft Dynamics 365 For F&0, Microsoft Business Central, Microsoft Cloud Solutions, Office 365, Microsoft Teams. AXcite | security compliance | microsoft, dynamic, power, cloud, finance | 0 |
axians.be | A versatile Hybrid IT infrastructure and Cisco Networking ecosystem offer significant improvement in terms of security, management, performance and user experience. | term security, security management | industry, audiovisual, story, process, banking | 1 |
ayofa.be | aYOfa’s industry knowledge and market expertise helps its clients to make the right decisions when it comes to the complex world of Post-Trade & Securities Financing. | trade security, security financing | financing, trade, change, toggle, independent | 2 |
b-b-computing.be | internet for all… adsl… internet security… antivirus KMO… webshop… contact… FTGate… Internet Security… | computing | 0 | |
b-solutions.be | B-Solutions installs and configures quickly, accurately and correctly. Security, stability and usability are always central in our service. We integrate this new setup on your existing solution. | correctly security, security stability | install, need, innovative, sell, repair | 1 |
b2b-apartments.be | B2B Apartments Knokke | Luxurious Knokke apartments - All comfort is present to give work and enjoyment the right place. Mix business with pleasure. | ubiquiti security, security gateway | apartment, luxury, luxurious, comfortable, practical | 0 |
b2u.be | For your Information and communication technologies, computers and networks, PACNET offers you full expertise in computer and telecommunication, consultancy, training, security, assistance. And also specialised software, tailor-made applicaton, adapted hardware and software. We provide Information… | training security, security assistance | bring, statement, network, strategy, sale | 1 |
bacbi.be | …elected president, Abdul Majeed Hassan, had been barricading themselves inside the building for two weeks fearing arrest by the Palestinian security services. "The soldiers destroyed the contents of the building and broke equipment that was to be used in activities during next week," Barghouti | national security, security advisor, palestinian security, security service | university, israel, israeli, palestinian, academic | 2 |
backstagecom.be | Are you a provider of hardware, network solutions, or IT security services? A software developer? An innovative Regtech or Fintech? | solution security, security service | market, ceo, partnership, financial, creation | 1 |
badmintonhalle.be | Error: Error validating access token: The session has been invalidated because the user changed their password or Facebook has changed the session for security reasons. Type: OAuthException | session security, security reason | official, error, cup, admin, backup | 1 |
baea.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | ea, enterprise, uncategorized, case, october | 1 |
baef.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | fellowship, american, foundation, alumnus, fellow | 1 |
bahadir.be | Within my team, Bahadir was working on the release management of mainly security patches on the Windows Server-platform : from planning, preparation, validation to aftercare. Bahadir is very meticulous, a prerequisite when doing this job, and handles his work in a very autonomous way. He is… | mainly security, security patch, monthly security, availability security, security key | engineer, cloud, microsoft, certify, senior | 2 |
bakkerij-raes.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, winston, absolutely, basic, feature | 1 |
balert.be | Innovative tyre management Basic tracking and security Intelligent applications for direct and indirect tracking Mobile monitoring, identification and security Mobile monitoring and control | management security, security fuel, track security, security intelligent, identification security | track, monitor, fuel, theft, fleet | 11 |
bandit.be | Fight criminals with BANDIT active fog generators. Deprive them of the view of loot and ensure a protective environment at lightning speed. The BANDIT fog generator is a reliable and effective security solution, completely harmless, leaving no trace. Activate BANDIT and make every robbery or… | leader security, security fog, effective security, security solution, active security | bandit, fog, series, fast, generator | 10 |
banksoft.be | Today’s international banking operations solutions require in-depth IT and telecommunications expertise. Workable solutions and procedures must fit current system architectures and commercial strategies to deliver consistent, cost-effective performance. In addition, operations and data security… | system security, security audits, datum security, security increasingly, business security | system, banking, telecommunication, swift, operation | 3 |
bants.be | BANTS Consulting is a European consultancy, based in Brussels, offering confidential strategic security solutions. BANTS clients enjoy custom tailored solutions, implemented in an agile manner, with scalability and resilience built-in, safeguarding lives, assets, and deliverables. | strategic security, security solution, security risk, matter security, security concept | strategic, consulting, agile, scalability, custom | 16 |
bartcoppens.be | This is my personal page. I'm a part-time assistant professor of system and software security and a post-doctoral researcher at Ghent University, ELIS, Computer Systems Lab (Faculty of Engineering and Architecture). I also have a research-related page . | software security, security post | photography, interest, presentation, picture, currently | 1 |
bastboombeheer.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, theme, absolutely, basic, feature | 1 |
bats.be | BATS is an electronics company specialized in the design, development and supply of advanced technology solutions in the fields of Defence and Homeland Security . | homeland security, cyber security, security monitor, security case | system, advanced, technology, defence, tactical | 9 |
batteur.be | Implemented data storage system (including security) for the French mission; (NAS : Synoglogy). | system security, security french | technology, skill, manager, linux, environment | 1 |
battlebranding.be | Enjoy fast, secure, and reliable hosting for your website, with robust servers, advanced security, and 24/7 monitoring for a seamless online experience. | update security, security technical, advanced security, security monitor | lead, generation, battle, consultancy, study | 2 |
baxter.be | Baxter and Hillrom are uniting to meet the challenges of a rapidly-evolving healthcare landscape. Together, we will work to enable care efficiencies, improve care outcomes and broaden access to care in the hospital, home and alternate care settings. | product security | healthcare, care, baxter, story, community | 0 |
bbconsulting.be | Bart Blommaerts: I am a passionate Application Architect, who believes closing the model-code gap is essential to make rapid, agile delivery sustainable. I have a strong focus on API design, reuse, automation and security. I'm always looking for technical challenges. | automation security, security technical | bb, consulting, conference, nov, read | 1 |
bbnc.be | On October the 6th, BBnc was founded by Hilde Bousard and Peter Beke. Ever since we are specialised in networks and security but also databases and OS were our specialities. | network security, security database, security gdpr, lecture security | network, october, gdpr, cloud, speciality | 3 |
bbva.be | Why BBVA Business?: For our international leadership, our specialized solutions and for our strength and expertise. | security priority, tips security, security recommendation | financing, strength, specialize, leadership, interest | 0 |
bcsr.be | National Security. An old concept thought “acquired for ever” after the end of the Cold War. Geo-political and societal events have brought the necessity to defend our values, freedom and security of society, people and the economy back into the… | national security, security old, freedom security, security society, relate security | readiness, societal, society, course, national | 5 |
bddtranslations.be | Federal authorities (foreign affairs, national defence, justice, finance, social security, public health), the Regions (housing, agriculture, transport, town and country planning), and the Municipalities (administration, social housing) | social security, security public | translation, rate, confidentiality, quotation, rush | 1 |
be-agile.be | With the Be-Agile tools as part our distributed technology used (Cloud) , no big investment into the IT network is mandatory. Easy to use, natively multi-lingual , our tools are the key element for the local development of the SME’s | datum security | agile, technology, network, africa, easy | 0 |
be-digit.be | PARTNERSHIPS WITH COMPANIES THAT WANT TO BENEFIT FROM OPEN ARCHITECTURE TECHNOLOGIES IN THE SECURITY OR THE AUTOMATION INDUSTRY | technology security, security automation | digit, happen, offer, member, network | 1 |
be-ius.be | On 1 March 2015, with wide experience and practice in several languages, Hans Van de Cauter decided to establish BE-LEX, a new law office situated in Brussels | collateral security | law, lawyer, area, history, tariff | 0 |
beachsoccerbelgium.be | Error validating access token: The session has been invalidated because the user changed their password or Facebook has changed the session for security reasons. | session security, security reason | soccer, beach, nl, error, slide | 1 |
beauskinclinique.be | Error: Error validating access token: The session has been invalidated because the user changed their password or Facebook has changed the session for security reasons. | session security, security reason | skin, wishlist, view, cart, nl | 1 |
beca.be | The Belgian Cockpit Association, BeCA, is the only recognized professional association representing airline pilots in Belgium. | pilot, airlines, safety, member, cockpit | 0 | |
becloseprotectiongroup.be | Through its solutions for human surveillance, security, hygiene, tidiness and reception, BCP Group Facilities offers its partners high-quality multi-services | surveillance security, security hygiene | ecology, picture, hygiene, industry, diplomatic | 1 |
becompany.be | Engitech is the partner of choice for many of the world’s leading enterprises, SMEs and technology challengers. We help businesses elevate their value through custom software development, product design, QA and consultancy services. | analysis security | idea, custom, technology, admin, finance | 0 |
bedigitaltogether.be | Women make up 52% of the population in Belgium, but only 17% of them find their way into the digital sector! Recruitment of women into the digital sector or into jobs requiring digital skills must be supported. To achieve this, we gamble on career guidance or professional reorientation, so that… | cyber security, security coalition | woman, gap, career, education, girl | 0 |
beeldbankwest-vlaanderen.be | …be made use of for all your e-mail messages, consisting of consumer solution queries. Many individuals that utilize Rapidgator are not worried regarding their safety and security since this kind of solution is secured. One of the most prominent solutions that Rapidgator uses is the e-file account. | cycle security, security information, datum security, security protection, safety security | file, usenet, premium, user, feature | 4 |
beer-bike.be | …both passions together and join our Beer Bike activity! Sit together with all your friends and pilot the beer bike around the streets of Brussels! We've installed a powerfull sound system on the bike as well as a beer keg & cooling system so you can enjoy a cold brew during the ride - Sweeeeeet!! | beer, bike, unlimited, rental, antwerp | 0 | |
beerselect.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | beer, brewery, brew, brewing, necessary | 1 |
befamily.be | The Belgian Diplomacy Family Association, in short BeFamily, is the membership association for family members with a partner or parent employed in the external career of the Belgian Federal Public Service Foreign Affairs, Foreign Trade and Development Cooperation. BeFamily is run by, and for… | social security, security pension | family, diplomacy, member, financial, report | 0 |
beforua.be | Need for security: victims of wars have been subject to sensory overload, and typically jump at the slightest noise. Thus, please be very considerate: notify them before turning on the vacuum cleaner or the food processor, knock before entering a room, avoid leaving the TV or radio on constantly… | refugee, family, ukrainian, host, donation | 1 | |
behealthcare.be | Creation of private practice & optimization of patients workflow, IT advice and security, remote work & Server virtualization | advice security, security remote | healthcare, medical, display, artificial, imaging | 1 |
behindcloseddoors.be | a good place for discovering disruptive technology and to forge strong relatioships with experienced cyber security professionals." | cyber security, security major, security professional | program, registration, past, edition, cyber | 2 |
beia.be | BEIA IS A R&D PERFORMING SME WITH FOCUS ON TIME CRITICAL ARTIFICIAL INTERNET OF THINGS (AIOT) AND A TEAM WITH EXPERIENCE IN R&D SERVICE INNOVATION (AI, BLOCKCHAIN, CLOUD, BIG DATA, QUANTUM SECURITY), HARDWARE (SENSORS, ACTUATORS, | quantum security, security hardware | thing, artificial, critical, sme, innovation | 1 |
belaface.be | Copyright © Belaface. All Rights Reserved | security privacy | cosmetic, sign, previous, return, llc | 0 |
belastingtarieven.be | ©2024 Belastingtarieven | Privacy & Cookies | General terms and conditions | | social security, security contribution | rate, tax, short, order, glance | 0 |
beleggingsfiscaliteit.be | He always makes sure that he is fully up to date with the taxation of investments and has published numerous articles on the subject (e.g. on fixed income securities, the application of the Cayman tax to dedicated funds, the extension of the scope of Article 19bis to so-called alternative funds… | income security, security capitalisation, security application | meer, bloom, tax, investment, topic | 2 |
belforlogistics.be | can file a protest at any time. If BELFOR LOGISTICS n.v. uses external parties, partners or subcontractors for services, they will also have to comply with the new regulation. In a processor agreement it will be agreed that they must take appropriate security measures and how they can be controlled. | appropriate security, security measure | logistic, purpose, shipping, load, cargo | 2 |
belgbook.be | When you subscribe to Keep2share Premium, your files and downloads are fully protected by Keep2share's state-of-the-art encryption system. You'll never have to worry about the security of your data again. Enjoy supersonic downloads from our state-of-the-art cloud storage. Plus, take advantage of… | server security, security feature, service security, security datum, strict security | file, premium, storage, user, cloud | 8 |
belgear.be | BELGEAR is a webshop and physical walk-in store in Poperinge, Belgium, specialized in Tactical Clothing, Gear and Equipment for Police, Military, Security and O | military security, security outdoor | view, bag, glove, black, gtx | 12 |
belgian-travel-confederation.be | The CERTA label is a recognition of both the public and private sectors. Travellers have the security of knowing that they are dealing with professionals who want to offer the best. | traveller security, security professional | travel, confederation, report, sign, traveller | 1 |
belgianidpro.be | In order to get access to the online services of the Social Security, you must be registered as an employer. Discover here how to register your company. | social security, security employer | number, advantage, overview, employee, request | 5 |
belgianoffshoredays.be | 802 Networks is a value-added distributor with over 15 years of experience, specialized in (wireless) connectivity and security solutions including a range of additional services such as installing and configuring your network solution and site surveys. | anchor security, security cyberplan, connectivity security, security solution | offshore, industry, energy, fair, technology | 3 |
belgianoffshoreplatform.be | With a 2,262 MW production capacity , the Belgian offshore wind sector makes a significant and guaranteed contribution towards security of supply. | contribution security, security supply | offshore, energy, sail, safe, climate | 1 |
belixys.be | Belixys is providing mobile surveillance solutions for temporary security for major public events thanks to is intelligent temporary security camera solution which will enable the organization to act quickly and decisively. Our self-powered rapid deployment mobile video surveillance solutions can… | video security, security cctv, mobile security, security solution, temporary security | rapid, deployment, system, electronic, cctv | 17 |
belnet.be | Since 2016, Belnet has been connecting the Federal Scientific Institutions (FSIs) with the internet and each other using the ScienceMAN network. One of the best known member organisations is undoubtedly the Royal Meteorological Institute (RMI). | trust security | technical, admin, connectivity, corporate, network | 0 |
belram.be | Since 1964, Belram has been a leading Belgian and Luxembourg distributor of connectors , cables , interconnection systems and accessories for professional power, control, data, audio, video and lighting applications. | safety security | fiber, cable, connector, accessory, neutrik | 0 |
belsquare.be | …offering a pleasant view of the surroundings and plenty of light, and each residence boasts a practical and fully equipped kitchen. A videophone and a security door ensure your safety, with our secure underground car park offering direct access to the housing units in the building via a lift. | videophone security, security door | apartment, manual, residence, short, bedroom | 1 |
belv.be | As the Belgian nuclear TSO (Technical Support Organization), Bel V has developed a large scope of technical expertise necessary to perform appropriately the multidisciplinary nuclear safety, nuclear security & radiation protection assessments and inspections. | nuclear security, security radiation | nuclear, safety, regulatory, radiation, technical | 1 |
benchmark-telecom.be | Ranger was developed to temporarily provide optimal coverage in certain areas for services such as mobile telephony, data, Wi-Fi and trunking. It can also be used on locations that require security cameras, lighting, etc. Ranger is the newest Benchmark Telecom innovation and unique on the market. | location security, security camera | benchmark, operator, turnkey, wireless, network | 1 |
benjaminslap.be | add-ons AdWords AdWords scripts bing conversion optimization cookies css development e-mail encryption expectation management GDPR Google google analytics google search console google tag manager html images jquery local services ads marketing mobile photos programming reporting SEA security SEO… | sea security, security seo | analytic, user, graphic, webdevelopment, search | 2 |
bergspace.be | We are passionate about bringing enterprise-level productivity, scalability, and security to any businesses. | scalability security, security business | enterprise, technology, automation, productivity, passionate | 5 |
bermudabeach37.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | bermuda, beach, visitor, verklaring, necessary | 1 |
besmartenergy.be | Epsilon provides for full width, custom, transitional background images, in the slideshow position, a full width container, specifically designed for RokSprocket's Features layout. It also has separate options for per panel background and content images. Read More | adp security, security bv | energy, smart, meer, background, custom | 0 |
besqa.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | bespoke, visitor, necessary, feature, functionality | 1 |
betrace.be | Betrace’s unique patented Electronic Drug Detection system offers high security yet rapid access to single nominative medical products in different formats across our range of dispensing units. | speed security, high security, security rapid | storage, unit, medical, secure, medication | 2 |
betransparent.be | Click here (fr) (or here – nl) to read the report from the Security Consultant (RSM InterAudit). This report confirms that Mdeon meets the conditions set by the Privacy commission in terms of securing the IT environment. | report security, security consultant | act, report, sunshine, annual, mdeon | 1 |
bewelcome.be | Legal advice and execution of Immigration & social security matters in relation to international employment | social security, security matter | legal, family, employee, execution, advice | 1 |
beyondhermit.be | I trust that my reality is such that everything that has happened is as it was meant to be. There is an order and a design behind it all. There is a sense of security that comes from this. In my case, the trust comes naturally and has been there for a long time. As with other beliefs, if you truly… | sense security, security case | reality, thing, belief, creation, spirit | 1 |
bezoekersregistratie-ddi.be | The security procedures, the privacy legislation as well as the expectations of the customer demand a contemporary visitor reception. | visitor, registration, reception, virtual, secure | 1 | |
bhc.be | Nowadays, it's imperative to have the latest technologies but also to ensure the proper functioning of theses. Our infrastructure department will assist you in the choice of tools adapted to your needs. Of course, we will not neglect the security of your infrastructure. | course security, security infrastructure | sale, approach, advice, custom, device | 3 |
bigbrotherawards.be | Belgium was not the first country – many of its neighbours already introduced similar measures without sufficient safeguards to ensure the respect of privacy. Worse, introducing measures which undermine the security of citizens' data and their privacy can seriously backfire. Using vulnerabilities… | law security, security intelligence, measure security, security citizen | big, award, brother, government, citizen | 2 |
bigindustries.be | …Big Data Architect who has gained extensive experience architecting, implementing and operating large scale data processing solutions based on enterprise and emergent Big Data technologies including designing, implementing and integrating solutions with information security & IT governance systems. | information security, security governance | big, industry, engineering, analytic, devops | 1 |
bignited.be | Uncover the importance of quality testing in preventing back-end errors and security breaches. | error security, security breach | automation, thank, career, generator, engineer | 1 |
bioscan.be | Barco, a global technology company, designs and develops visualization solutions for a variety of selected professional markets: medical imaging, media & entertainment, infrastructure & utilities, traffic & transportation, defense & security, education & training and corporate AV. | defense security, security education | healthcare, imaging, result, activity, short | 1 |
biotechinvlaanderen.be | …landed on their desks. With success. More than 10 billion euros found its way through Euronext, Nasdaq, Easdaq or private investments to Flemish biotech companies. Every euro invested in the sector became at least four euros ten years later, and every euro the Flemish government invested in the… | biotech, flander, flemish, story, order | 0 | |
biott.be | At Biott we offer a portfolio of professional consulting services, with a specialisation in Technology-driven Security Services. | technology security, security services | consultancy, tab, consulting, technology, specialisation | 1 |
birdseyeview.be | A few weeks ago the Vesta team released a new version because of a 0day security bug. I think after a few weeks it’s time, to tell the truth about the security bug. On 7 April 2016, I found hack activity on one of my servers. I also received the security report of the hacker to tell me how he has… | version security, security bug, truth security, server security, security report | eye, bird, view, apache, fpm | 1 |
birdyshop.be | © 2024 - Birdyshop developed by | security payment | copy, clothes, complement, light, red | 0 |
bitsaga.be | Introductory setups for entering the world of Bitcoin. We guide you with buying, storing and using Bitcoin securely whether personally or corporate. Direct answers to fundamental and technical questions without making possibly expensive mistakes. Tip, tricks and security audit of your entire… | trick security, security audit | wealth, secure, store, buy, storage | 1 |
bitservices.be | Design and Develop technical platform including system and application integrations, security and transformation. | email security, security appliance, system security, security professional, mail security | bit, ibm, availability, server, window | 7 |
blackcloud.be | Black Cloud offers IT consulting services on the following topics Enterprise Architecture Solution Architecture Security Architecture Technical Architecture Infrastructure Architecture | architecture security, security architecture | cloud, black, search, topic, technical | 1 |
blacklynx.be | Why wait until it’s too late? Enhance your information security now and fortify your digital defenses. With our Cyber Risk Assessments, Incident Response Planning & Support, and personalized Consultations, we help you identify vulnerabilities and fortify your business against cyber threats. | security awareness, information security, security digital, organization security, security weekly | response, cybersecurity, cyber, forensic, awareness | 6 |
blindtiger.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | tiger, necessary, map, distillery, imperial | 1 |
blug.be | The term "proxy" comes from English and in free translation means "intermediary". The term "proxy server" is also found on the Internet, which we will take a closer look at. What is a proxy server? A proxy server, also known as an intermediary server, mediates the exchange of information... | cyber security | technology, cyber, server, number, cloud | 0 |
boblaureys.be | Our team is a centralized, multi-disciplinary group of SAP consultants and developers. We are specialists within SAP IDM, SAP CLOUD Security, SAP HANA Security , as well as generalists across SAP HANA Cloud Platform. | cloud security, security sap, hana security, security generalist, exclusive security | case, study, sap, iam, access | 4 |
bochassis.be | At BO Chassis we make it a point of honor to supply you with quality products. Our custom-made doors bring comfort, security and style to your home, discover them! | comfort security, security style | frame, wood, screen, step, awning | 5 |
bodicker.be | After I entered my password for my Apple ID, I was greeted with a new screen, prompting me to select three security questions, answers, and a backup mail address in case it all goes pear-shaped. And unfortunately, it did... | session security, security question, screen security | list, movie, player, album, heavy | 2 |
bodin.be | Manufacturers of equipment and software are continuously developing their products. By means of updates, the latest functionalities reach the end users. Discovered vulnerabilities or enhanced security are also offered through updates. If you wish, Bodin will visit you on a regular basis to keep… | network security, security services, maintenance security, security updates, vulnerability security | bodin, network, store, happy, secure | 5 |
boekhouderloket.be | When establishing a company, you need to register yourself and your company with a social security fund for self-employed workers. You will also need a health insurance fund. | social security, security fund | step, flander, tax, corporate, entity | 4 |
bomretiro.be | Bom Retiro has many great qualities. Already 3 holidays long we enjoyed the exquisite quality of the food!! It is superbe getting served at Bom Retiro. The rooms are perfect in size and so clean , i don’t think cleaner is possible . The estate is managed with great care for its guests . The… | general security, security privacy | holiday, gallery, room, soul, pool | 0 |
booleanbv.be | Boolean is an experienced software partner that builds custom software for automation and system integration. Focused on both industrial and building automation, we are experts in seamless integration and control of any type of equipment. | automation, insight, build, cloud, connectivity | 0 | |
bosch-press.be | Bosch Media Service contains press releases, press photos, videos and other materials which aim to support reporting about the Bosch Group. | security system | release, mobility, share, technology, build | 0 |
botanictower.be | Botanic Tower is an iconic building overlooking the Botanical Garden of Brussels, Belgium, situated in the city’s North District | reception security | tower, botanic, view, city, build | 0 |
boucartmedical.be | Dilumen is a system reserved for the endoscopic treatment of colon polyps, allowing the creation of a stabilized therapeutic zone, under vision, and mastered. The system is equipped with 2 sutures allowing the traction of the banks of the polyp allowing a controlled and complete progressive… | resection security, security maximum | medical, surgery, equipment, functional, technology | 1 |
brainembassy.be | Necessary cookies ensure that all components of this website function properly. It concerns cookies for the security of the website, cookies for load balancing (e.g. the distribution of requests to a web server over a number of computers) and cookies for the adjustment of the user interface… | cookie security, security website | embassy, brain, community, story, antwerp | 1 |
brainpool.be | In short, when your company needs technological, analytical or strategic know-how, Brainpool is able to offer a solution in the short term! If you want to know how Brainpool can make a difference, contact us without any obligations. | consultancy, opportunity, developer, profile, able | 0 | |
brainpowerproductions.be | Worry less about security, caching, and talking to the server. Static sites are the new thing. | worry security, security server | brain, static, automate, hello, great | 1 |
brainwin.be | Brainwin provides basic computer training, computer security training, network security training, it training, internet training and e-business training services. All improve productivity, efficiency, knowledge and motivation. An old quote says: 'information is power'. We think knowledge and… | computer security, security training, network security | outsourcing, consulting, strategy, strategic, innovation | 5 |
bramkelchtermans.be | Graduated from Hasselt University as a Master in Computer Science (Networking & Security and Engineering Interactive Systems) in 2020. My interests span home automation, automations in general and developing web-applications with affinity to both front-end and back-end development. | network security, security engineering | network, system, user, science, smart | 7 |
brandle.be | Still, you would be surprised to see what’s possible. Plus: Reddi comes with a nifty subscription, wich includes hosting, support, security updates, SEO-optimisation and other goodies. Now that’s what we call peace of mind. | support security, security update | agency, creative, photography, creation, strong | 1 |
brebaco.be | area ensures efficient management of the API lifecycle, from design to deprecation. We excel in optimizing API gateways for performance, ensuring security protocols and providing insightful analytics. This approach not only streamlines internal operations but also enhances external collaborations… | performance security, security protocol, compliance security, security standard | integration, sap, process, api, orchestration | 2 |
brelco.be | Brelco biedt een totaalpakket van Elektro, Network, Energy, Smart Building Automation en Security Solutions. | automation security, security solutions, security solution | meer, automation, network, energy, building | 9 |
brema.be | Legislation requires from companies in the food industry that they develop a system to assure the security of their products. Companies have to make a check of critical points in the production procedure, to avoid that pathogenic germs contaminate food. Therefore, they have to apply the HACCP… | food security, system security, security product, security general | meal, ready, member, market, system | 6 |
breweryofideas.be | We focus on the following topics: Digital Transformation, Cloud, Data Management, Analytics, Internet of Things, Industry 4.0, Smart Cities, Blockchain, Artificial Intelligence, Machine Learning, Cyber Security, Privacy, Employee Experience and Management. | cyber security, security privacy | brewery, idea, conference, talk, view | 1 |
brhrd.be | Feedback by Brussels for Human Rights and Development on the Draft Initiative – Aggregated Emissions Data Reporting for Shipping Companies | health security, security partnership | human, health, report, corporate, island | 0 |
brightest.be | Software Quality AI (SQAI) Coaching Performance testing Security Testing BrightScan ERP Testing Test Automation Flex Testing | testing security, security testing, term security, security awareness, feature security | bright, testing, digitalization, qualitative, answer | 4 |
brightfox.be | Our ISO27001 and ISO9001 certifications highlight our focus on Information Security and Quality. | information security, security quality | salesforce, success, summit, country, select | 2 |
brussels-school.be | Want to stay updated about our research and educational activities, events, publications, etc.? Then make sure to sign up for our monthly BSoG newsletter , or for news about one or more of our research centres . | centre security, security diplomacy | research, jun, migration, register, education | 0 |
brusselsmajorevents.be | …large public events for the City of Brussels and other government bodies. Our events, which are often free, revitalize the capital, boosting local development and tourism alike and bringing wider socioeconomic benefits. Sustainability and responsibility are an integral part of every project. | security coordinator | summer, major, coordinator, sustainability, pop | 0 |
brusselsstudentrooms.be | We rent cozy student room with ten-month lease. Family atmosphere with professional services. The student buildings are located near the universities VUB and ULB. | room, month, crown, nl, university | 0 | |
bs16.be | The historical house from the 16the century has been totally renovated in 2012 to answer to the latest security and comfort requirements. The building has also been equipped with camera security, fire detection and an acces control system with badges. | late security, security comfort, camera security, security fire | price, build, garden, antwerp, house | 1 |
bubblekeys.be | © 2021 Gilles Capelluto - All rights reserves - Powered by BubbleKeys. | privacy security | access, view, private, owner, house | 0 |
budts.be | It's been 5 years since I wrote my last blogpost. Until today. The past years my interest in blogging declined. Combined with the regular burden of Drupal security updates, I seriously considered to simply scrap everything and replace the website with a simple one-pager. … | drupal security, security update | writing, vim, meetup, drupal, today | 1 |
bugoff.be | Digitalocean uses cloud-init to configure the images. Cloud-init depends on some python packages. The latest version in debian jessie doesn’t support DO yet, which makes the initializing process slow. As the cloud-init package doesn’t have any wierd dependecies i just wget the package. | key, package, server, vmware, file | 0 | |
buildingbruges.be | Philippe De Ryck helps developers protect companies through better web security. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. As the founder of Pragmatic Web Security, Philippe delivers security training and security consulting… | api security, security right, downfall security, security vulnerability, guideline security | uncategorized, build, bruge, developer, category | 8 |
buildit-academy.be | …95 squads. In the meantime, you will get to know everyone at fun networking events and be involved inside real projects. You will also have the opportunity to obtain important certificates (AWS to name one). After completing the traineeship, your innovative career at DPG Media can really take off. | trainee security, security engineer | academy, dpg, build, traineeship, challenge | 0 |
burkert.be | You are using an outdated browser. Unfortunately, this does not allow us to guarantee that our website can be used without any errors. The use of outdated browsers often leads to low speed and security problems, too. We recommend that you install a new version or an alternative browser to get the… | speed security, security problem | valve, control, system, overview, fluid | 1 |
buschgens.be | Coordinating Secure Phone II project for Law and Enforcement. Developing custom build Hardware Crypto phone, Custom build Crypto Operating System, Crypto applications, GSM Sim configurations Jasper. VPN Connections, secure connections; Various Microsoft and Apple system management server desktop… | azure security | responsible, virtualization, self, docker, virtual | 0 |
business-economics.be | The landscape of supply chain management is undergoing a monumental transformation, driven by the integration of blockchain technology. From enhancing transparency and security to improving efficiency and reducing costs, blockchain is poise to redefine how … | transparency security, security efficiency | late, today, uk, june, economic | 1 |
bvbavermeulen.be | Vermeulen, building technologies – more comfortable living, more intelligent work – electricity, security, HVAC and energy management – 09 369 95 18 | electricity security, security hvac | energy, technology, electricity, integration, system | 13 |
c-tegrity.be | all rights reserved - C-tegrity - 2020 | cloud, cybersecurity, meer, consultancy, case | 0 | |
c4i.be | Delivering market proven solutions to meet your organization's end-to-end operational data needs. We enable the acquisition, storage, preparation, delivery, visualisation and governance of your production data. Without compromising on security for users and applications. | datum security, security user | industry, improvement, operational, ot, manufacture | 1 |
cadenz.be | During our strategic move to cloud program, it suddenly became clear that progress and success depended entirely on our ability to manage privacy and security risks. Cadenz consultancy proved itself in the field being able to master the situation quickly and proficiently. | privacy security, security risk | consultancy, advisory, delivery, technology, able | 1 |
calsys.be | Our technical support is at your service anytime for support in case you need it. A night guard service guarantees a continuous availability, for your security and that of your residents | availability security, security resident | system, phone, ip, smart, accessory | 1 |
camilleloward.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
camjo.be | CamJo - Your partner in safety & Network services | camjo security, security solutions, security level | system, keypad, monitor, hub, button | 0 |
campagne-ssa.be | …overall food supply, the environmental sustainability of production, processing and distribution, etc. Moreover, access to quality food is even more difficult for the most vulnerable in our society. We propose the creation of a new branch of social security to address these fundamental challenges. | social security, security food, security fundamental, security system | health, demand, topic, democracy, environmental | 5 |
campariredpassion.be | Ensures visitor browsing-security by preventing cross-site request forgery. This cookie is essential for the security of the website and visitor. | visitor security, security cross, essential security, security website | red, gallery, http, visitor, artist | 1 |
campro.be | Campro has been providing technical solutions for the security of homes, businesses and public spaces since 2004. Contact us without obligation. | campro security, security alarm, solution security, security home, monitor security | system, track, space, fire, registration | 25 |
canhappenibiza.be | …villa in Ibiza style with a charming, cosy decoration, close to the childfriendly beach of Cala Vadella (1,5 km) with a private swimming pool. Outside it is very nice to chill in the loungecorner, at the pool or at the table under the covered terrace. You can enjoy a beautiful sunset every day ! | security deposit | price, surrounding, drive, picture, availability | 0 |
capitald.be | Your data is your capital. Together we embark on your data-centric journey, from Data Governance and Information Security to the delivery of Data Centric Transformation projects. | information security, security delivery, security process | compliance, centric, governance, cloud, change | 3 |
cardiokoekelberg.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
cartronics.be | …Shop… Secure payments… Our stores… Specials… Samsung Galaxy Tab A9+ SM-X210 64Go Wi-Fi Silver… View… | view, galaxy, gb, sm, cart | 0 | |
casacalida-interior.be | The lobster traps are used to collect lobster from Bali's coral reefs. Every three days, fishermen lay them in the water tocatchfish for their markets. It is worth noting that these traps are far more environmentally friendly than others, inflicting less damage to the oceans, isn't that wonderful… | accessory, interior, candle, lobster, calida | 0 | |
casinoking.be | With Itsme®, sign up now on Casino King and enjoy fast processing and enhanced security for the confidentiality of your personal data. Automation in just a few clicks saves you valuable time, allowing you to quickly immerse yourself in the world of all your favorite casino games. | speed security, security traditional, enhance security, security confidentiality | game, king, gaming, winning, card | 2 |
casper-wouters-portfolio.be | …As an example you can see here below a letter written to TDK solutions in the style recommended in the course "communication skills". Since this was a test and I at this point had already agreed on my internship with Inetum-Realdolmen, this was the only communication I've had with TDK solutions. | view, database, network, skill, internship | 0 | |
cb-pc.be | BCO BV IT Services Multimedia Gaming Console Repair Component Level Network Firewalls Security and Wifi | firewalls security, security wifi | repair, level, console, network, gaming | 10 |
cba-consulting.be | 2022 – CBA promoting durable self-designed renewable energy devices in Luxembourg, Netherland, France and Italy | consulting, industry, energy, self, device | 0 | |
cbe.be | The Council sanctioned nine individuals and entities in view of the activities related to illegal weapons programmes carried out by the DPRK, in violation of relevant UN Security Council resolutions, and in view of the military support given by the country to Russia’s war of aggression against… | un security, security council | council, june, meeting, president, european | 1 |
cbsolutions.be | Information security is part of the business, your company will need a Information Security policy. We can help you implement these policies in your environment and provide support in every step of the way. | information security, security business, security policy | infrastructure, result, need, strategy, cloud | 4 |
ccp.be | IT services could specialists Brussels cloud computing network management IT security IT advisory IT support server management | management security, security advisory | ccp, cloud, computing, network, server | 4 |
ccrek.be | News… Working for us… Contact… Menu… Presentation… Vision and values… Competences… Reviewing… | social security | community, region, submenu, flemish, affair | 0 |
cde.be | CDE s.a. - Electricity - Security - Networking - Computing | electricity security, security network | computing, electricity, network, general, legal | 0 |
cdm-ict.be | Cases… | huur security, security guard | advisor, trust, consultancy, guard, microsoft | 0 |
ce-shop.be | With 128-bit SSL security with advanced encryption you are guaranteed that your purchases are safe. | ssl security, security advanced | clean, ml, oz, kit, ultimate | 1 |
cebrig-ulb.be | security of workers’ livelihoods; the greater solidarity to be established between the various sectors of the economy; and all other topics that business life can spark now and in the future. ” More generally Emile Bernheim’s will stressed the importance of working beyond disciplinary boundaries… | research, member, paper, phd, conference | 1 | |
cecimo.be | …emphasizes that the association’s focus is on education, talent, and e-skills. Through the promoting of these focuses, the regulation of the IT industry will become manageable, and players in the industry will have to conform to the new norms. As such, IT specialists will have avenues in which to… | sport security, security association | european, activity, employee, standard, skill | 0 |
cediva.be | Multiple formulas are possible to be able to work as customized as possible. The full day training consists of two parts, both of which rely on an original method for improving security awareness. This interactive training is suitable for a maximum of 12 participants in a day formula. It can be… | training security, security jeweler, security awareness, level security, robbery security | theft, counter, prevention, criminal, awareness | 9 |
cedricdelval.be | "I had the pleasure to work with Cédric for 8 months at Nynas AB in a type of business new to me. Cédric has a depth of knowledge and was very good at explaining technical things to a person not that technical as me. He can work very focused and hard to solve issues and handle many things at the… | vestibulum, elit, eget, laoreet, orci | 0 | |
ceeyu.be | The digital footprint of your suppliers could become entry doors for cybercriminals to your organization. And even if they don’t, a security incident at one of your suppliers could disrupt your operations. Using Ceeyu's Third Party Security Risk Management (TPRM) service, you can detect cyber… | platform security, security risk, footprint security, cyber security, party security | risk, attack, chain, supply, footprint | 25 |
ceficb40.be | For any medical assistance, please contact Cefic Reception. Please note that Cefic is not allowed to provide any medicines , including painkillers. Our building has a defibrillator located on the 13th floor for sudden cardiac arrest and first-aid trained staff that are ready to help you. | reception, floor, area, meeting, build | 0 | |
cemrest.be | Your contribution, no matter the size, can help CEMREST expand the reach and depth of our life-changing work. Together, we can build a more equitable, sustainable, and prosperous future for all Africans. | community, sustainable, change, african, climate | 0 | |
centexbel.be | Centexbel-VKC is division of Centexbel, the Belgian textile research centre, and is focused on services on behalf of the plastics processing industry. | ghent, centexbel, processing, testing, lab | 0 | |
centralsecure.be | DIRECT CONTACT… Home… WiFi… Netwerk en Security… Support… Contacteer ons… SD-WAN design… fiber… | netwerk security | tab, survey, fiber | 0 |
cerac.be | means for Belgium. The analysis revealed that most planetary boundaries were crossed at the Belgian scale. This confirms the relevance for CERAC to focus on climate and biodiversity-related risks in their first risk assessment and underscores the importance of addressing other sectors in the future. | risk, climate, resilience, boundary, future | 0 | |
cercle-athena.be | The goddess Athena is often depicted with an Owl, symbol of Wisdom, Strength and Intelligence. | studies security, security defence | defence, activity, council, executive, committee | 0 |
cergroupe.be | Ideally located within the Walloon biotech network, CER Groupe provides companies, universities, institutions and individuals with high-quality services in the life sciences and agricultural sectors. The group stands out by providing an end-to-end, pre-clinical solution in a regulated environment… | asset security, security datum | innovation, clinical, testing, feed, university | 0 |
ceris.be | “ CERIS program attracted me for two reasons: it covered widespan themes such as international security, arms control, global warming or human rights, and it gave an in-depth perspective on every region in the globe, not focusing exclusively on the West or China. During a whole year I had classes… | international security, security arm | executive, lecturer, teach, politic, system | 1 |
cgrs.be | The CGRS offers protection to foreigners who fear persecution, conflict or violence if they return to their country of origin. The CGRS examines each application for asylum individually and independently. It issues certificates and documents of civil status to recognised refugees and stateless… | report security, security situation | asylum, refugee, person, country, form | 0 |
challenge-handling.be | Home… About us… CEIV Pharma… Infrastructure… Expertise… Live animals… Oversize… Dangerous goods… Oil &… | challenge, handle, pharma, airport, infrastructure | 0 | |
champaint.be | XSRF-TOKEN Ensures visitor browsing-security by preventing cross-site request forgery. This cookie is essential for the security of the website and visitor. | visitor security, security cross, essential security, security website | paint, sip, expiry, http, necessary | 3 |
channelawards.be | This annual event stands as the pinnacle of the year, drawing together key stakeholders within the Channel ecosystem. Here, partners, competitors, customers, and prospects converge in a uniquely exclusive networking environment that culminates in the thrilling live voting and the presentation of… | best security, security vendor | channel, award, microsoft, january, vendor | 0 |
channelnews.be | acom, Orange Belgium et Kappa Data récompensés lors de l’événement partenaires Discover24 de Barracuda. | fortinet security, security day | jun, channel, arrow, sign, cloud | 0 |
charleroi-culture.be | …to access your data from anywhere, at any time, and from any device over the Internet is very useful. DDownload places great emphasis on the security of your documents, so you won't have to worry about it. For example, your files are stored in a password-encrypted vault that only you can access. | datum security, security step, emphasis security, security document, file security | file, premium, storage, space, cloud | 10 |
charlottevandyck.be | Glazing Making your own glaze is a bit like pastry and chemistry together. Security is important, always wear gloves and a mask. | chemistry security, security important | glaze, ceramic, clay, red, handmade | 2 |
chateaucharles.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | room, stay, castle, necessary, reservation | 1 |
chg-meridian.be | Supplement your usage model with supporting services such as asset management, sustainability solutions and data security. | technology, healthcare, equipment, industrial, device | 1 | |
christofvg.be | We now have the foundation of our Virtual Datacenter in place. We created a central hub, meant to accommodate centralized services like firewalls, domain controllers, file servers, … . Spoke networks are created for specific workloads that need to be separated from other workloads for security or… | workload security, security governance | azure, virtual, series, powershell, kubernetes | 1 |
chrononavette.be | if you need a private driver, a car, do not hesitate to contact us for a service on msure, a service of comfort, freedom, pleasure and security, with your conditions. | pleasure security, security condition | airport, driver, ecology, transfer, trip | 1 |
cimind.be | It is a complete process that starts with risk analysis . Followed by evaluation of the possible threat scenarios for your business, the conceiving of the organizational and physical security controls, auditing and evaluating of them. | waterproof security, security solution, security product, physical security, security control | process, complete, bruce, number, technological | 5 |
cirkeline.be | Homeworking & data security animation Status: Graphic Designer – Stad … more Homeworking & data security animation | datum security, security animation | graphic, designer, prevention, report, annual | 5 |
ciso-as-a-service.be | CISO As A Service (CAAS) is a cyber security services company, providing security governance, risk management and cyber security program for businesses. When needing only a part time CISO with a high level of competencies : ask for Ciso as a service | cyber security, security service, ciso security, security audit, experience security | ciso, cyber, cybersecurity, governance, program | 32 |
clarson.be | Copyright © 2022 SECURITY TOOLS BV uw partner in bouwkundige beveiliging | Webdesign door Hazier | copyright security, security tools | astridlaan | 1 |
claus-partners.be | All of our investigators are licensed by the Federal Government Department of Internal Affairs, Board of Private Security. | private, investigator, antwerp, investigation, corporate | 1 | |
clearit.be | Home… Blogs… Contact… [email protected]… Privacy Verklaring… Scroll naar… | clear, system, network, cloud, consultancy | 0 | |
clevop.be | Move away from paperwork and bring intelligence in your operation by digital solution of your business administration | security priority | operation, feature, report, offer, directly | 0 |
clew.be | In addition to lower office and infrastructure costs, working remotely has many advantages. Let your staff work remotely by implementing the best Microsoft solutions. Clew can provide you the best design that fits your needs to ensure redundancy, availability and business continuity at the highest… | reliability security, security scalability, solution security, security installation, high security | connect, technology, microsoft, system, server | 4 |
climb-it.be | ClimB-IT specializes in finding the right IT solutions and services for clients' business needs, | productivity security, security core | climb, success, mountain, value, need | 0 |
clockworkbee.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | consent, bee, user, month, gdpr | 1 |
cloudar.be | While your team focuses on software, Cloudar will enable automation: from code implementation and infrastructure to security and system management. | aw security, security operation, infrastructure security, security system, flexibility security | aw, cloud, manage, practice, cost | 8 |
cloudbrew.be | Give us your best sessions! Topics related to Microsoft Azure, AI, IoT, big data, architecture, scalability, distributed systems, security, project experiences, ... are very much welcomed. Anything you are passionate about in these areas could have its place at CloudBrew! Make sure to submit more… | system security, security project, architecture security, security track | azure, microsoft, user, conference, track | 2 |
cloudbuilder.be | We can work with you from assessment to strategy definition and execution – help you to setup blueprints and orchestration or automation layers. Compare different cloud platforms, covering compute, storage, networking, unified communications and security. | cloud security | cloud, build, big, pipeline, strategy | 3 |
cloudchampion.be | All Cloud Champion users can follow a series of Modern Work, Security, Business Applications, Azure Acceleration and Surface programs. After completion, users will receive a certificate to demonstrate their learning progress. | security practice, smb security, security solution, microsoft security, security technology | microsoft, cloud, azure, program, register | 16 |
cloudmax.be | In 2009 kon ik aan de slag als system engineer en heb ik veel kennis en ervaring kunnen opdoen met het hele spectrum van IT infrastructuur; van Microsoft Azure cloud implementaties, Intune deployments tot meer traditionele on-premise infrastructuur projecten. | microsoft security, security administrator | microsoft, cloud, azure, administrator, intune | 0 |
cloudsisters.be | Our robust and proactive security solutions integrated into every aspect of our cloud services, protect against vulnerabilities, ensuring compliance with the latest standards and regulations. | advanced security, proactive security, security solution | cloud, future, infrastructure, challenge, ahead | 3 |
club-69.be | CLUB 69 is a +20 club with a zero tolerance when it comes to drugs. Our security has the authority to refuse entrance based on misbehavior, disrespect to any visitors, bystanders, staff or dj’s. Respect and dignity is what we represent. | drug security, security authority | room, city, minded, historic, center | 1 |
club54.be | Copyright © Club54 | Interne Security | Externe Security | Huisreglement | Designed by GEE & IS | interne security, security externe, externe security, security huisreglement | buy, ut, dolore, jun, birthday | 1 |
clubofthefuture.be | We are allergic to any kind of cross-border behavior. If you experience or witness any form of aggression, discrimination, sexual harassment etc. please report it to trained bar staff, first aid or security. | future, visual, pm, music, head | 1 | |
cnps.be | CNPS Belgium provides practical Software and hardware / Designing / Banner / LOGO / IP Cameras and Security solutions for any business. Solutions should make things easier, not more complicated. They should add real value. As your partner we create an affordable solution that works for you. We are… | website security, security system, camera security, security solution, goedkoop security | system, easy, practical, thing, complicated | 8 |
codeflow.be | Keep your data safe and secure. Design your application with security in mind, at the very beginning of your project. | security default, application security, security mind | technology, cloud, reference, need, devops | 2 |
codeweb.be | Python is one of the most commonly used programming languages for developing chatbots. It offers a wide range of libraries and frameworks that make it easy to build chatbot applications. Other popular programming languages for chatbots include JavaScript, Java, and C#. Ultimately, the choice of… | programming, language, technology, java, program | 0 | |
coeckemachines.be | We provide a complete offer that includes the conception, production, distribution, installation, security and maintenance of your machines. | installation security, security maintenance, compliance security | industrial, supplier, address, standard, complete | 4 |
cogitus.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information and cannot be desactivated. | functionality security, security feature | trademark, legal, ip, identity, intellectual | 1 |
colloq2022.be | Ahmed Ogwell is currently Acting Director at Africa CDC and the founding Deputy Director. An accomplished public health specialist, he has led the repositioning of Africa in the global health security architecture at national and continental levels. Ahmed is an alumnus of the University of… | health security, security architecture | health, read, pandemic, disease, research | 1 |
comapps.be | We take care of everything for your website or e-commerce, from the domain name to maintenance, including hosting and security. | creation, card, host, agency, api | 2 | |
combinant.be | Combinant: a high performance intermodal terminal at the crossway of major European transport axises, a strategic resource for intermodal transport. Hupac has been “on board” of this journey from the very beginning back in 2008. Today our network handles more than 32 trains per week at Combinant… | security protocol | intermodal, network, rail, antwerp, road | 0 |
combis.be | …fair smart contracts. In the modern world, there is no more room for manual and biased review of insurance risks. We protect your assets and we guarantee that if the risk is materialized, you will receive your insurance compensations automatically, without delays or complicated review procedures. | blockchain security | insurance, token, smart, payment, asset | 0 |
comlink.be | Digital security, now more than ever. From firewall to endpoint protection . We will take care of it. | consultancy security, security development, endpoint security, digital security, security firewall | consultancy, cloud, backup, infrastructure, care | 11 |
commeuneimage.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | consultancy, necessary, wedding, warning, goal | 1 |
common.be | …them insights into the latest trends and technologies within the IBM i ecosystem. This exposure, and networking with business professionals, not only enhances their technical skills but also equips them with a deep understanding of real-world business applications, infrastructure and security.” | announcement security, security storage | common, power, member, ibm, picture | 5 |
communiekledingverhuur.be | We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings. | domain security, security reason, browser security, security setting | setting, domain, able, external, map | 1 |
commyounity.be | CommYounity – HR & Pension specialists, together, for you. | social security | law, employment, th, avr, uncategorized | 0 |
compu-it.be | © 2024 - All Rights Reserved | Powered by Compu-IT | security backup | gaming, backup, select, power, reserve | 0 |
computer-solution.be | Computer Solution is, except the general ICT, specialised in virtualisation, infrastructure, network and security. | information security, security organisation | theme, startup, knowledge, infrastructure, computing | 3 |
conciergegustave.be | Looking for a private concierge service by the sea. We take care of your home. Cleaning, garden maintenance, window cleaning, personal appointments, ... | security check | clean, appointment, window, care, private | 0 |
condaco.be | Propose architectures that support business needs and reduce threat exposure according to the risk appetite of the organisation. Architecture (risk) assessments, design target architectures, security roadmaps using frameworks like SABSA, NIST, ISO27k, ... | appropriate security, security control, ict security, security role, type security | cybersecurity, innovation, risk, secure, empower | 14 |
connectisgroup.be | Our mission is to meet all the technological needs of companies. Our clients benefit from a single point of contact that ensures global coverage of their needs: 24/7 helpdesk, homeworking, internet access, telephony, technology strategy, project management, development, network security, Cloud… | software security, security web, challenge security, security risk, network security | technology, technological, need, cloud, single | 4 |
connexcenter.be | Connexcenter consists of a professional team which is available 24/7 to provide friendly and efficient personal assistance in emergency situations (burglary, fire, medical alarm, ...). | fire, technology, efficient, center, burglary | 0 | |
conques.be | In order to be able to welcome you in complete safety, we have taken the necessary security measures, about which we would like to inform you. | necessary security, security measure | room, breakfast, package, history, view | 1 |
conscientconsulting.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | consulting, necessary, meer, consciousness, problem | 1 |
consecutive.be | We help you to understand information technology better, build superior platforms, find a sustainable path to growth and achieve cost-effective leadership while maintaining a high-performance infrastructure. | application security, security waf | step, logical, infrastructure, path, leadership | 0 |
consium.be | Consium BV - Salesforce Consultant, Webdeveloper, Social Media and more... - Affordable hosting and websites. | ddos security | salesforce, host, consultant, premium, affordable | 0 |
consultant-erp.be | management - Project Management Methodologies - Training on 6 different ERPs - Service Management Process - Business Intelligence and BI reporting tools - BI Concepts and articulation of ERP databases - Review of the main tools - Management of Soft Skills in ERP projects - Meeting animation, stress | quality security, security development | consultant, sap, dynamic, microsoft, nav | 0 |
consultum-it.be | This includes network setup, security, optimization, troubleshooting, and wireless networking. | setup security, security software, security optimization | system, network, user, talk, server | 2 |
contilabel.be | Lots of materials : paper, synthetics (PE, PP), thermal paper, thermo-transfer, transparent material (no-label look), ... | conti, material, print, roll, nl | 0 | |
contour8.be | —Did you you see see her? her? —The lobby lobby was was full full of of people. people. Police, Police, security, security, barriers. barriers. I I realized realized how how ridiculous ridiculous the the situation situation was. was. I I pictured pictured myself myself jumping jumping on on an an… | police security, security barrier | nl, polyphonic, case, agency, artist | 1 |
contxt.be | Enjoy this unique experience with a view to the future of technology, exploring key themes data center infrastructure, control room solutions, cybersecurity, data security, disaster recovery, backup, networking, and audiovisual technology. | datum security, security disaster, ceo security, security officer, infrastructure security | register, speaker, keynote, schedule, future | 3 |
cooperworks.be | Protect your business from cyber threats, safeguard the integrity of your data, and ensure the continuity of your operations. We provide tailor-made security measures that fit your unique needs. Safeguard your digital infrastructure and stay one step ahead of today's digital challenges. | tailor security, security measure, threat security, security digital, productivity security | consultant, infrastructure, efficiency, cloud, knowledge | 3 |
copasec.be | PREBYTES How to detect remote desktop? Cyber Threat Intelligence is a boost to your security Mobile Application Security gives a safe environment to evolve a business social engineering attacks happen Bezpieczeństwo małych oraz średnich firm. Ochrona biznesu. Obsługa incydentów Protecting website… | result security, boost security, security mobile, application security, security safe | difference, ready, fun, finally, anyways | 2 |
cordage.be | Discover in one click all our made-to-measure creations! Nets, ropes, straps, mats, ladders, tarpaulins, climbing ropes, swings... And even more if you wish! | industry security, security equipment, child security, security stair | rope, accessory, strap, price, coconut | 0 |
coreerosexploratie.be | For men who love massage, touch, stimulation and sensuality within security and empowerment in respectful contact with a man. My integrative method uses touch and massage as a form of art. I approach you as a body-mind-eros unity. | sensuality security, security empowerment | core, body, mind, integration, genital | 1 |
corelan.be | Corelan Cyber Security Research Exploit Development Tutorials Training Infosec Training corelanc0d3r | cyber security, security research, class security, security con | exploit, research, tutorial, class, cybersecurity | 11 |
corese.be | CORESE is a IT Consulting company that is active in 3 domains | development security, security solutions, security solution, security audits | consulting, level, domain, pmo, itil | 0 |
corilus.be | With encrypted registration, automatic backups and other security measures, CareConnect Physiotherapist is GDPR-proof and ISO-certified. | privacy security, backup security, security measure | care, discover, nurse, physiotherapist, pharmacist | 5 |
coriotech.be | Coriotech can also improve the security of your IT infrastructure by considering future threats and providing appropriate security solutions. | coriotech security, security infrastructure, appropriate security, security solution | network, smart, audio, future, market | 9 |
cornelisconsulting.be | Business leader, connecting with customers, inspiring service & project teams. Team development, individual support and stakeholder management. | fichet security, security solutions, nato security, security clearance, national security | consulting, stakeholder, individual, program, certificate | 0 |
cosign.be | As the official distributor for Cosign products in Southern Africa, Maizey Plastics proud association with Cosign spans over 16 years. We have experienced them to be a trustworthy and highly professional organization with honest business ethics. The Cosign product range is synonymous with quality… | security frame | frame, sign, eco, signage, display | 0 |
cosmictripmachine.be | Wscbet Online Casino Malaysia stands as a premier destination for Wscbet Casino gaming enthusiasts. Offering a wide array of thrilling casino games, including slots, blackjack, roulette, and live dealer games, it caters to every player’s taste. With a strong commitment to security and fair play… | feature security, security seamless, advanced security, security measure, security enhancement | game, malaysia, gaming, gambling, user | 13 |
cota.be | We are also working on issues such as health, education, vocational training, employment, peace and security, social cohesion, governance and the digital transition. | peace security, security social | process, learn, entrepreneurship, documentary, change | 1 |
cotebo.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | safety, storage, prevention, petrol, legal | 1 |
cotrain.be | We provide STAFFING & PROJECT CONTRACTING. Our core is IT, Business Intelligence, Project Manager, Security manager and Business Analysis staffing. | manager security, security manager, security management, drive security, security expertise | staff, manager, vacancy, academy, process | 24 |
couponmaker.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | coupon, pay, ready, wallet, apple | 1 |
coupontools.be | Security is priority. Eliminate digital coupon fraud thanks to our secure and single-use validation methods. | coupon, voucher, loyalty, trial, register | 1 | |
coursalpha.be | London Escorts and clients will always meet up at one of the hotels that offer escort services in London. This is because of the security that hotels like to offer especially after dark, for this is where escorting meetings take place. The escort agencies usually accept credit card payments for… | london security, security especially | relationship, alpha, escort, london, romantic | 1 |
covalens.be | Based upon proven best practices, we help you to set up, embed and maintain a robust service governance framework. We ensure that this integrates ecosystem management, information security guidance and a comprehensive continual service improvement lifecycle management. Our core offering consists of: | information security, security guidance | reference, technology, program, crono, strategic | 1 |
covrd.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | legal, sirius, technology, necessary, ready | 1 |
craftedknives.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | damascus, cart, necessary, visitor, advertisement | 1 |
creative-atoms.be | If, for instance, someone was assaulted in a poorly-lit car park or robbed because of inadequate security, the homeowner could be held accountable for the victim’s losses for irresponsible security. | inadequate security, security homeowner | injury, claim, property, liability, attorney | 2 |
creersiteweb.be | Our web security service provides advanced protection for your site. Thanks to expert solutions and continuous monitoring, your platform is safe from threats. Contact us for enhanced web security. | web security, security service | creation, audience, showcase, pricing, presence | 1 |
cresco.be | Our team of cyber experts is ready to take your cybersecurity to the next level. Our greatest asset is our background in ethical hacking. We thoroughly examine your systems, just like real hackers would. This provides you with a realistic assessment of the maturity of your security systems. Based… | free security, security assessment, implementation security, security measure, maturity security | cybersecurity, assessment, approach, penetration, red | 13 |
crevetterecords.be | Swedish Professionals Your Planet Is Next and Acronym team up as Excellent Security to eliminate any attempts to disturb... | excellent security, security attempt, security ep | record, ep, release, second, space | 4 |
crisis.be | We do not allow direct comments to the posts, mainly for reasons of security and the burden of constant monitoring and going through an approval process. | reason security, security burden | knowledge, thought, nunc, resilience, picture | 1 |
cristian-sanchez.be | The Networking and Security course includes an explanation of how a computer network works and how to define the infrastructure requirements to provide security and continuity of information systems. | network security, security course, requirement security, security continuity | course, requirement, resume, knowledge, programming | 3 |
cropland.be | CROPLAND is your preferred partner if your organizations wants to increase efficiency through smart use of data and A.I. technology. By leveraging data and technology as tools, you achieve a data-driven policy. | security statement | strategy, engineering, cloud, analytic, advanced | 0 |
crossculture-training.be | Some people and organizations believe that this law goes against religious freedom. Law enforcement officials and security experts believe that the privilege of wearing a veil could be abused by unscrupulous individuals. Balancing the rights for religious freedom with the safety of the general… | official security, security expert | cultural, intercultural, cross, country, difference | 1 |
cryptona.be | Improve security through better processes and technology. Security is prone to human error. Especially in cryptography-based security, doing things correct is vital. When done right, it brings a completely new world of possibilities, enabling you to do complex things in a simple way. | cyber security, security solutions, technology security, security prone, cryptography security | secure, certificate, vault, cryptographic, cyber | 8 |
cryptosecurity.be | …persons and the disclosure of classified information can have serious consequences for our institutions and their functioning. Cybersecurity has become a major concern. In this context, the use of cryptography is a central element of data protection. Properly used, it provides effective security | accreditation, cryptography, cybersecurity, system, legal | 10 | |
ctow.be | CTOW has extensive experience of dealing with all kinds of oil pollution; responding to emergencies at terminals, hazards or disasters at sea and executing and enforcing security procedures and interventions. | sea security, security procedure | marine, general, operation, worldwide, combine | 1 |
cubelgium.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | cube, consumer, understand, insight, community | 1 |
cudeso.be | Support for integration and automation of MISP in incident management workflow. MISP training and best practices. | practice security, security advice, computer security, security incident, environment security | practice, advice, network, system, environment | 0 |
cultureanimiste.be | At the Dailly barracks, Jean-Pierre Bonsen, military security agent, arranges my departure for Katanga with Wilmes who sponsors me as a former night paratrooper on occupied Belgian territory. I’m 20 years old. | military security, security agent, african security, security ndola | african, friend, family, africa, bari | 2 |
currentopinion.be | Current Opinion is a peer-reviewed, Open Access journal that publishes case reports and case series focusing on diseases . The journal provides specialists, researchers, lecturers, and students a unique platform to keep up to date with the expanding volume of information published in the field by… | cpec security, security challenge | issue, current, opinion, abstract, theory | 0 |
customssupport.be | Our cutting-edge IT solutions enable you to monitor all processes 24/7, while we adapt to digital trends to ensure the highest security standards | high security, security standard | custom, clearance, global, industry, trade | 1 |
cvdm.be | We noticed that your browser does not support the latest technologies of web 2.0 and does not meet the standards in terms of security and display. This is why you may encounter problems loading this site. | term security, security display | photography, browser, paint, photographer, polaroid | 1 |
cxonet.be | CxO Magazine (print & digital) were created to enhance peer learning and distribute relevant information in an efficient way. E-business, leadership, customer succes, strategy execution, funding & lending, enterprise resource planning, cloud computing, supply chain management, unified messaging… | syber security, security key | discover, leadership, level, community, advisory | 1 |
cyber-security.be | Services… News… About us… Contact Us… Home… Site map… Events… Company Profile… Vision & Mission… Learn… | cyber security, security services | cyber, map, profile, need, advice | 0 |
cyber3lab.be | We are very pleased with the pen test performed by Howest's research group. They helped us identify vulnerabilities in our systems and provided valuable recommendations to improve our security. Their expertise and professionalism were impressive. We highly recommend Howest's research group for… | ot security, ai security, security context, recommendation security, security expertise | lab, cyber, immersive, cybersecurity, research | 26 |
cyber4sme.be | Are you an SME? Register for free to one of our cybersecurity workshops financed by the FPS Economy! The FPS Economy, in collaboration with Headmind Partners, is offering SMEs a unique opportunity to take part for free in cybersecurity awareness workshops. These workshops, in the form of a crisis… | sme security, security incident | sme, cyber, game, escape, cybersecurity | 0 |
cyberevent.be | Event 2020… | cyber security, security event | cyber, secure, aware, awareness, step | 0 |
cybereyes.be | …online. As we are licensed ethical hackers, we offer a full range of services to protect you against virtual crime. CyberEyes offers flexible managed security, industry-leading technologies and tailored consulting engagements, to help you solve threat challenges and close data protection gaps. | flexible security, security industry, capability security, security program, action security | cybersecurity, technology, firewall, threat, safety | 4 |
cyberinit.be | CyberInIT, your trusted cybersecurity partner in Wallonia, centered around Liege. We offer expert security audits, vulnerability scans, penetration tests, and training programs. Safeguard your business against cyber threats with our proactive cybersecurity services. | expert security, security audits, management security, security flaw, datum security | cybersecurity, vulnerability, wallonia, threat, program | 11 |
cybermind.be | Over… Neem contact op… Diensten… | cyber security, security consultancy, security assessment | cyber, tab, consultancy, tomorrow, today | 0 |
cybermonk.be | Spam is being sent through your website, or your webmaster didn't apply security updates and your website is screwed up. | webmaster security, security update | domain, wing, quick, advice, sun | 1 |
cyberscape.be | CyberScape has been constructed so that the game can easily be run by the internal security team, creating contacts between security and non-security personnel. Previous experiences show that during these moments, various internal security issues have come to light and allowed the security team to… | cyberscape security, security awareness, basic security, security hygiene, internal security | awareness, game, employee, previous, escape | 14 |
cybersecurity-law.be | Franck is also researcher in data protection and cybersecurity law at the Cyber and Data Security Lab (CDSL), which is part of the internationally renowned Research Group on Law, Science, Technology & Society (LSTS) at the Faculty of Law and Criminology of Vrije Universiteit Brussel (VUB). | datum security, security requirement, security lab, privacy security, security policy | law, cybersecurity, gdpr, external, advice | 6 |
cybersecurity-research.be | Flanders delivers excellent academic research in cybersecurity. With the Cybersecurity Initiative Flanders the government boosts this research capability, facilitates the transfer of knowhow to society and industry, and supports the knowledge transfer through training, outreach and communication… | security services | cybersecurity, research, flander, track, secure | 0 |
cybersecuritychallenge.be | Based on the principles of a Capture The Flag (CTF) , this computer security competition is a challenge-based game played by teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering… | cyber security, security challenge, security revelation, security contest, security strategic | challenge, cyber, prize, edition, academic | 39 |
cybersecuritycoalition.be | RHEA Group is a systems engineering company headquartered in Belgium, with a strategic focus on both space and cyber. The Group provides bespoke engineering solutions, systems development and security services to critical infrastructures, mainly in the space, defence and security sectors. Pascal… | cyber security, security coalition, security gazette, application security, security experience | cyber, member, cybersecurity, authority, private | 22 |
cybersecuritytechpublishhub.be | Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data. | center security, security cyber, cyber security, security tech | cyber, hub, tech, publish, view | 0 |
cybertest.be | We test how your current cyber security policy scores on 10 important basic principles for a coherent cyber security policy. | cyber security, security policy | cyber, risk, assessment, report, pillar | 1 |
cyclick.be | Technical environment: Adobe Flex 2, PureMVC, Adobe LiveCycle Data Services, Java 5, Spring 2.5 (Core / Security / Web Services), Hibernate 3, JBoss Drools, JAXB, JUnit, Maven, Hudson, Subversion, MySQL, Oracle, Tomcat. | social security, security datum, spring security, security hibernate, security activemq | java, developer, lead, technical, flex | 4 |
cylab.be | We are the Cyber Defence Lab of the Royal Military Academy (Belgium). We aim to be a center of excellence in all aspects of cyber defence: protection, detection, incident response and management. | cyber security, security coaching | lab, research, education, cyber, defence | 0 |
cylex-belgie.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | ensure security, security fraud | launch, duration, storage, view, device | 0 |
cs-products.be | CS Products is de Graphic Arts Partner van OKI voor alle grafische printers uit de OKI Pro serie | cs, oki, eng, inkjet, foil | 0 | |
dabble.be | Vault by HashiCorp is a veritable swiss army knife for security implementation. From storing dynamic secrets to facilitating PKI infrastructure: This tool is ready for it. | pki security, security measure, technology security, security level, knife security | pki, linux, system, automation, infrastructure | 2 |
dadir.be | Together to the next level. That is what Dadir specializes in. Passionate about quality management and information security. | information security, datum security, security gold, state security, security scan | process, risk, meer, worth, person | 7 |
daedeloth.be | The NTAG2x password protection only allows you to set a 4-byte password, so you can’t really call it a security measure. I decided I would use the 4-byte password to discourage users overwriting the tag, but the true authentication would lay in using an SHA-256 HMAC on the content I would write… | password security, security measure, time security, security requirement | number, game, hour, card, revenue | 2 |
dan-wood.be | Where better to chill than under the towering hip roof of the NEXT 90WT? The stylish slatted wall provides a sense of security that you would otherwise only feel within your own four walls. Here you can sit and relax, protected and unobserved, and devote yourself entirely to some 'me' time. | sense security, security wall | roof, house, flat, terrace, balcony | 2 |
danacareers.be | and around Bruges. We’re here and we’re here to stay, which means you are too! That’s because a job in the metalworking sector at the Bruges hub is a choice for stability. Welcome to the Dana family. You’ll be welcomed with open arms at Dana, where we are always innovating to create a secure future. | opt, opportunity, nl, frontier, future | 0 | |
dance4wellness.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | dance, search, rhythm, request, necessary | 1 |
danosafe.be | SECURITY CONSTRUCTION… SECURITY EQUIPMENT… Safes… Used products and destocking… Mechanical and… | security construction, security equipment, security services | equipment, lock, mechanical, electronic, banking | 0 |
darchis.be | Unbox is a spin-off from BNP Paribas Fortis that allows employers to offer a wide range of flexible benefits to their employees. Being a sensitive topic, security has been at the heart of the project. We built a state-of-the-art platform on Amazon Web Services with its security policies while… | topic security, security heart, services security, security policy | volunteer, skill, engineer, feb, aw | 1 |
darioincalza.be | As an experienced cybersecurity and privacy professional I have a profound understanding on how to create and coach engineering teams that excel in tackling highly complex security and software engineering problems at scale. I strongly believe that cybersecurity has a big impact on creating and… | cyber security, security professional, infrastructure security, security ciso, complex security | cybersecurity, android, highly, problem, conference | 12 |
datagenic.be | …goals. Embracing the latest technologies and industry best practices, we deliver cutting-edge data architectures and strategies, ensuring scalability, security, and optimized performance. Experience the transformative impact of data with DataGenic as your trusted partner on your data-driven journey | datum security, scalability security, security performance | strategy, approach, organization, innovative, today | 2 |
datagnostic.be | Datagnostic Networking designs, deploys and maintains network solutions for small and medium-sized businesses. We are specialized in Cisco Systems networking technologies, and will gladly assist you with all your Network and Security implementation projects. | network security, security meulebeke, security implementation, art security, security measure | network, wireless, technology, cisco, standard | 11 |
datamundi.be | Carefully recruited and trained, our linguists work solely online on the Datamundi platform, which guarantees clients the highest possible level of confidentiality and security. Datamundi undertakes an ongoing process of quality control of all the work being carried out in more than one hundred… | confidentiality security, security datamundi | human, skill, artificial, creation, manager | 1 |
datanewsawards.be | Technology has changed the way enterprises do business and go to market. This award seeks to identify large (*) IT service providers that add value in the entire enterprise segment, e.g from service innovation, delivery and security, data management, building loyalty and enhancing productivity to… | delivery security, security datum | award, edition, category, editorial, winner | 2 |
datanow.be | Data security is a rational cost. Ransomware is not. Prevent huge irrational costs, and protect your data. Curious to know how valuable your data is? Get a short glimpse of our data value tool, used to help value a companies data. | comprehensive security, security approach, datum security, security rational, security plan | safe, digitally, challenge, meeting, value | 7 |
dataplan.be | Remote support… NL… SR… IT-infrastructure… Cloud… Managed Services… Hardware and Software… About us… | security solution | cloud, infrastructure, remote, nl, sr | 0 |
datatech.be | …Dahua… Datalogic… Dicota… Dji… D-link… Dvd Software… Dyanix… Eaton Corporation… Ekahau… Elo Touch… | security software, panda security | power, drive, projector, storage, server | 0 |
datatopia.be | An almost magical formula... Datatopia is a SaaS* platform that securely processes your pharmacy data and exploits technological innovations such as Artificial Intelligence. Easy to use and accessible for all, Datatopia propels the entire pharmaceutical community into a promising new era. | pharmacy, lead, pharmacist, sale, feature | 0 | |
datavise.be | Data governance is crucial to ensure the accuracy, privacy, and security of data across an organization, fostering trust and compliance. | privacy security, security datum | success, analytic, governance, strategy, visualization | 1 |
daurigine.be | The Smiley is a sign of confidence for our consumers, it gives the guarantee that the alimentary security is optimal and that a credible hygienic system is followed. | alimentary security, security optimal | pizza, tomato, mediterranean, traditional, vega | 1 |
dautitech.be | All Projects… IT Category… Project Details… All Teams… Tech Category… Team Details… All Careers… Career… | sidebar, career, tech, category, history | 0 | |
davelli.be | Over the years we have been able to prove both our expertise and fine taste in everything jewellery related. We buy and sell jewels, certified diamonds and gold reliably and in complete security. | jewellery, diamond, jewel, discover, wedding | 2 | |
db-soft.be | …Firebase program, we specialize in leveraging all Firebase has to offer for your app. We make use of Firebase as one of our backends of choice for web and native apps. Since joining Google, Firebase now offers the benefits of a backend as a service with the scalability of Google's infrastructure. | feature security, security purpose | firebase, soft, core, backend, cloud | 0 |
dbyc.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | happy, painting, little, necessary, primary | 1 |
dcare.be | The Dcare technology allows you to take care of your loved ones via a bracelet connected to a system installed in their home. | autonomy security, security one | care, feature, institutional, system, network | 0 |
deadartistsociety.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | select, artist, dead, society, peace | 1 |
deblauweschuit.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | consent, user, month, gdpr, category | 1 |
declercqlab.be | Abiotic and biotic stresses are one of the major threats to food security worldwide and their severity is expected to increase under the projected global warming. As plants cannot escape from unfavourablegrowth conditions, they must continuously cope with these stress factors in the most effective… | food security, security worldwide | lab, pathogen, research, signal, nucleus | 1 |
defence-institute.be | Esprit guerrier , a French concept aiming to enhance the preparation for Belgian Land Component operations | security strategy, security defence, studies security | defence, research, institute, science, technology | 0 |
dehaese.be | COMPANY LAW CONSTRUCTION LAW AND REAL ESTATE CONTRACT LAW MEDICAL LAW CONTINUITY OF ENTERPRISES ACT AND BANKRUPTCY LIABILITY LAW AND CLAIMS FAMILY BUSINESSES INSURANCE LAW ENVIRONMENTAL AND ADMINISTRATIVE LAW CRIMINAL LAW INTELLECTUAL PROPERTY FAMILY LAW AND DIVORCES LABOR AND SOCIAL SECURITY LAW… | social security, security law | law, lawyer, insurance, debt, intellectual | 2 |
dekroegzemst.be | As trusted Linux experts, we are committed to providing open and honest guidance on how Linux can best fit into your environment. From stability and security to performance and cost-effectiveness, the benefits of Linux are numerous and undeniable. | stability security, security performance | linux, consultancy, course, organization, sysadmin | 1 |
del-law.be | A quality HR legal support implies transversal knowledge and practice of the various areas of the law that affect the workers : Individual and collective labour law, Social security law, Taxation of workers, Privacy law, Pensions, Independent contracts, Immigration. | social security, security privacy, security law | law, employment, lawyer, testimonial, legal | 3 |
delicecoffee.be | We noticed that your browser does not support the latest technologies of web 2.0 and does not meet the standards in terms of security and display. This is why you may encounter problems loading this site. | term security, security display | browser, technology, late, love, warning | 1 |
delpac.be | This product range has been attented in Europe (8 countries) to discover the Belgian and European police and security services. | police security, security service, safety security, security exhibition, security expo | fire, oct, department, safety, distributor | 6 |
delta-at.be | For security reasons an email will be sent to . Please click on the link inside this email to gain full access to the website. | delta, system, manual, automate, adhesive | 1 | |
delta-engineering.be | For security reasons an email will be sent to . Please click on the link inside this email to gain full access to the website. | delta, engineering, packaging, tray, leak | 1 | |
deltacampus.be | The adjacent south-west facing terrace provides additional outdoor space on each floor to enjoy the good weather. Special attention has been paid to acoustic comfort, security and a high quality personalised Wi-Fi connection. | comfort security, security high | delta, residence, room, premium, price | 1 |
demenagement-express.be | Our experience and our references are a guarantee of seriousness and security for your move. We offer different quality moving packages tailored to your needs. Simplifying your life, and making your move a unique experience, is our main mission! | seriousness security, security different | express, furniture, truck, quote, order | 1 |
demorette.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
denismaloir.be | Working in Cryogenic Engineering, I was in charge of the retrofitting and instrumentation of an Oxygen Compatibility test bench. I acquired knowledge in very high pressure equipment design and security, electrical systems design, and Siemens Simatic automation systems programming. | sight security, security hazard, design security, security electrical | elit, dolor, egestas, lorem, amet | 2 |
depannageserrurieramapav.be | A door is an important part of the security of the home , especially if it is armored. A specialist has the know-how and the tools . He can therefore guarantee me a job well done and quality equipment, whether for a repair or a lock replacement. Technicians are at our disposal for all requests… | important security, security home, door security, security shield, security armor | locksmith, price, repair, key, armor | 3 |
deparco.be | in niche and complex markets. As a people-oriented investor with an entrepreneurial mindset, Deparco supports its existing participations as a long-term investor and invests in new opportunities as co-investor with founders, managers, private investors and private equity funds. Our investments have… | resilient security | investment, technology, market, family, value | 0 |
depondfarm.be | This Private Pondfarm Collection is controlled by the Federal Goverment Justice (foj), Police Ypres, DOVO and was approved on the security of weapons and ammunition by Mr Ide himself. All the finds are reported to the Belgian Goverment and has a licence as a recognized Metal Detectorist. We have… | dovo security, security weapon | hide, log, guestbook, visit, pond | 1 |
designfrom.be | …masks… Bags… All brands… Angular… Balvi… Fiftyeight tassen… Goodnight Light… Loqi… Mr… | security policy | view, quick, bowl, cup, coffee | 0 |
desirecollenstichting.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | foundation, private, trust, toggle, research | 1 |
desktop.be | …them inaccessible without the decryption key. Additionally, you can use secure shell (SSH) to transfer files securely between systems and ensure data protection. It is also important to regularly update the operating system and software to patch any security vulnerabilities that could be exploited. | invisible security, security privacy, software security, security vulnerability, compatibility security | desktop, shortcut, icon, file, window | 5 |
desprookjeswinkel.be | Protected with spells, goblins and some muggle security systems, we keep all your data safe. | muggle security, security system | card, disney, game, wizard, star | 1 |
destree.be | GDC is the dedicated division of Destrée Organisation, specialised in high-level events requiring the expertise in protocol matters, VIP welcome, media relations and security. | european, success, reference, conference, university | 1 | |
desutter.be | Skip to footer… dont use Page not found… Test page Default… 2024 HOME PAGE PLACE… Page not found… | telephony security, security electricity | electricity, telephony, electronic, default, necessary | 0 |
detectamet.be | …your production line & detection systems are calibrated regularly. Physical contaminants within the food production process can damage equipment and cause injury. If these contaminants aren't detected and they reach the consumer, your company will be faced with an expensive recall, which… | detectable security, security seal, knife security, security cages, tags security | metal, equipment, ray, uk, stationery | 0 |
detoile.be | Domaine de l'Etoile is a unique 104 hectare estate set in an exclusive residential area on the outskirts of Brussels. | sa, estate, real, phone, domain | 0 | |
deurbelbescherming.be | …hinges of a door are a good example of this. These are screwed and are therefore very sturdy. The special screws in this category provide more security because they offer extra protection against burglary. By using these screws to mount the video doorbell protector, you make it extra difficult… | theft security, security video, doorbell security, security screw, category security | nl, wire, theft, dual, anti | 10 |
deurklinkenshop.be | Back to security hardware Aluminium Stainless steel Zwart White Old Silver Old Yellow Roest Titanium Brass Nickel / Chrome bronze | security hardware, standard security, high security, maximum security, cylinder security | black, old, pair, steel, stainless | 20 |
deuzex.be | Morbi in ipsum sit amet pede facilisis laoreet donec lacus nunc viverra nec blandit vel, egestas et augue vestibulum tincidunt malesuada tellus. | ict security, security solutions | morbi, ipsum, augue, nunc, amet | 0 |
develite.be | We match access rights to the exact needs of your users and thus optimise security and compliance while reducing your licensing costs. | optimise security, security compliance | system, future, implementation, user, ready | 2 |
develop-it.be | Develop-it – Supporting real development | develop, real, learn, level, technology | 0 | |
devgenix.be | Apply existing standards for programming, naming, security - performance and provide proper code documentation | naming security, security performance | developer, highly, vacancy, university, qualified | 1 |
devine.be | …list of internships for students to choose from. You may expect to end up in a challenging creative sector with both national and international agencies. Approximately 85% of the students are offered a permanent contract at the internship. Job security is a fact when you have a Devine diploma. | job security, security fact | devine, visual, curriculum, skill, alumnus | 1 |
devoxx.be | …with a special focus on Java 23 and Generative AI. Attendees will experience a diverse range of local and global talent, presenting groundbreaking developments in programming such as Java, Cloud, AI & Big Data, Security, Architecture, Programming Languages, Methodologies, and Developer Culture. | datum security, security architecture, secure security, security testing | developer, community, java, practice, registration | 3 |
devsource.be | The demand for talented IT Developers is exploding and show no sign of slowing over the next years. Businesses will need a new approach because availability is dropping, and wages are rising. | soon, microservice, testing, developer, technology | 0 | |
dewielkeszuigers.be | De Wielkes Zuigers… Links… Sponsors… Socials… Contact… mei 26, 2024mei 26, 2024… april 22, 2024april… | thompson security, security tools | speedy, thompson, file, old, primary | 0 |
dewitlawoffice.be | Business law mainly concerns company law and contracts, but also intellectual property, tax law, etc. By having a permanent office in China, we work in close collaboration with the authorities of this country and companies wishing to set up in Belgium. We have therefore gained experience in the… | social security, security law | law, lawyer, firm, dispute, insurance | 0 |
dialando.be | Welcome to DIALANDO® - your online watch store in Europe. Enjoy special discounts on women’s watches and men’s watches that change every week. Free shipping on all orders above €75. Shop now! | watch, store, lady, military, swiss | 0 | |
diamantkring.be | Can we as diamond companies take control of our own fate? And what does the future of the natural diamond industry look like? These were some of the interesting topics that were discussed at our third Antwerp Diamond Session. | notch security, security place | diamond, member, antwerp, board, session | 0 |
diaxtechnologies.be | Security system installers: technical information regarding the status of systems placed at their clients’ premises | ibg security, security sprl | vba, access, system, microsoft, developer | 3 |
didisdna.be | Writing to make it manageable for ourselves. Writing because there has always been writing. By all… all that I know. Writing to maybe… touch someone. Writing as reason. A reason for a reason. Writing… for writing. For all the questions. For the need of safety, of security, salvaging. Writing to… | uncategorized, travel, sophia, poetry, song | 1 | |
diesel-service.be | In the event of a power failure, you must be able to count on your emergency generators. Their treatment is particularly important to insure security and continuity of your daily activity. This is where Diesel Service comes into play. | important security, security continuity | treatment, fuel, number, program, refine | 1 |
dieselmotorenservice.be | We understand like no other the importance of business security. That's why it's crucial to ensure that the maintenance of your core business is in good hands. Our technicians work with great care and commitment on Cummins engines every day. Thanks to our industry knowledge, our years of… | business security, security crucial | engine, repair, pump, fuel, industry | 1 |
dietergeets.be | …Process… Team… Price… Faq… Sign In… Sign Up… Portfolio… Portfolio 2col… Portfolio 3col… Portfolio… | hoeme security | posh, react, round, elizabeth, bell | 0 |
diforex.be | We provide quality advice and expertise in Digital Forensic Investigations on any type of investigation and data source. We also work as a court expert | cyber security, security awareness | forensic, analysis, advice, investigation, imaging | 0 |
digimads.be | Digimads is an IT consulting company that strongly believes in the power of coaching and training. Besides the important technical skills that are required for tech talent, we have a desire to go further with coaching. Coaching is directly concerned with the improvement of performance and… | engineer security, security architect | soft, skill, tech, strong, brilliance | 0 |
digimex.be | Home | DIGIMEX IT Networking & Security Infra | network security, security infra | network, wishlist, cart, guest, previous | 0 |
digitalappetite.be | Quality attributes with focus on modularity, security & testability; micro-frontends; API design; MVC / MVVM-C / VIPER; business & functional analysis; risk analysis. | modularity security, security testability | developer, skill, lead, tech, leadership | 1 |
digitalgenics.be | Improving security refers to the process of enhancing the protection of sensitive information, assets, and systems against unauthorized access, theft, damage, or other security threats. | damage security, security threat, risk security, security company, security tech | asset, sign, need, damage, threat | 8 |
digitalrealty.be | Meet your security, compliance, and sustainability goals with a data center partner that has capacity, resiliency, and experience. | security compliance | center, realty, connectivity, cloud, connect | 3 |
digitalstream.be | Unleash your business’s potential with Digitalstream’s diverse range of solutions, crafted to match your specific requirements. Prioritizing innovation and excellence, we provide personalized solutions that boost efficiency, elevate security, and stimulate growth. | efficiency security, security growth | investor, ux, optimization, search, engine | 1 |
digitopia.be | Stay informed about screen communication, digital signage and LED displays. Learn about new concepts in which digital screens with smart digital signage CMS software play a central role. | share security, security tip | signage, reference, discover, screen, interactive | 0 |
digitribe.be | DigiTribe offers advisory and consulting services, and realizes projects to accelerate digital enablement and innovation. | community, risk, cloud, innovation, consulting | 0 | |
digoprojects.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | meer, visitor, necessary, feature, functionality | 1 |
dinec.be | Dinec International designs and manufactures innovative security systems tailored to your specific requirements: access control, anti-intrusion, cold chain and building management. | manufacturer security, security system, innovative security, advanced security, security access | network, control, industry, university, hospital | 14 |
direct1.be | …in transport involves fast and flexible ways. Our speed couriers are distinguished from ordinary mail services by features such as speed, security, tracking, signature, specialization and individualization of transport express services, and swift delivery times, which are optional formost… | speed security, security track | express, shipment, speed, care, adequate | 1 |
dirkbrosse.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | conductor, personality, biography, necessary, orchestra | 1 |
discarlux.be | Discarlux Belgium provides Galician beef of the highest quality, honouring the animal that is sacrificed. Delivered directly from Spain. | transport security | beef, spain, directly, piece, meat | 0 |
discotheek-millennium.be | Home… EventsOur upcoming events… VIP Reservations… Bed & Drink… Tickets… Teambuilding… Events 2024… | reservation, drink, upcoming, house, price | 0 | |
dissco-flanders.be | field to their digitization and online publication will be addressed. The vision is to position European natural science collections at the centre of data-driven scientific excellence and innovation in biodiversity and environmental research, climate change, food security, health and the bioeconomy. | food security, security health | specimen, garden, extensive, research, infrastructure | 1 |
distributeursdebillets.be | Data collected and processed: Privacy choices, Users’ profiles, IP addresses, Device identifiers, Authentication-derived identifiers, Device characteristics, Precise location data, Browsing and interaction data, Non-precise location data, User-provided data, Probabilistic identifiers | ensure security, security fraud | launch, duration, storage, view, device | 0 |
divergentsoftware.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, big, view, analyst, absolutely | 1 |
divisionbyzero.be | Security Challenges of the Internet for Management As you see broad dangers to your PC’s information security, Internet security most likely hits the top score in your rundown. You clearly need to appreciate online opportunity so as to team up, convey and peruse the web,… | internet security, security internet, security important, security challenge, security suite | twitter, pinterest, linkedin, reddit, welch | 27 |
dj-bartje.be | We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings. | domain security, security reason, browser security, security setting | setting, domain, able, external, map | 1 |
dj-dj.be | We make sure that our bots are definitely safe, with the built-in Ddos protection and other security protocols, little can go wrong with your bot. | protection security, security protocol | discord, feature, moderation, temperature, cpu | 2 |
dju.be | How to to Make Make a a Smart Smart Security Security Camera Camera with with a a Raspberry Raspberry Pi Pi Zero Zero - - YouTube | weigh security, security convenience, camera security, security motion, software security | photography, youtube, light, photographer, lightroom | 75 |
dlmit.be | Hey, my name is Jonas De la Marche and I'm a cybersecurity specialist from the Ghent area. I studied System and Network Engineering and got a micro degree for Cybersecurity Specialist. | security implementation, new security, security product | cybersecurity, penetration, system, environment, testing | 0 |
dlpa.be | DLPA Lawyers represents Belgian and foreign businesses, public authorities, financial institutions, liberal professionals and self-employed people. We also represent the interests of shareholders, heads of companies, executives, employees, sales representatives and commercial agents. | social security, security law | law, property, liability, lease, procurement | 0 |
dmichiels.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | header, necessary, agency, gdpr, absolutely | 1 |
doccle.be | Doccle attaches great importance to your security. As a result, only reliable companies that cooperate with us can add documents on Doccle. Thus, the documents in Doccle are always real documents. The documents themselves are also encrypted, so that only you can see them. | security privacy, importance security, security result | assistant, invoice, safe, smart, paperwork | 9 |
dockwater.be | The Blue Deal calls for increasing the security of the water supply through off-grid solutions and creating an innovative , circular water economy that reduces aggregate consumption , which Dockwater addresses. | deal security, security water, security supply | antwerp, process, drink, environmental, consumption | 2 |
doctorpc.be | PC + Mac Service, web design & development, virus removal and antivirus installation, data recovery plus data banking, OS installation plus optimisation, data migration, server setup plus security camera installation. | plus security, security camera | doctor, tech, happy, remote, cost | 1 |
dodentocht.be | Necessary cookies are absolutely necessary for the proper functioning of the website. This category only includes cookies that guarantee the basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | department, edition, registration, release, cart | 1 |
dokterwitters.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
domestia.be | Welcome to Domestia Home automation at your fingertips Domestia home automation We have developed our own home automation system for installers, which we sell through our partner resellers. More about Domestia EASE OF USEEverything has been designed to simplify the task of installers and users… | automation, energy, task, system, user | 0 | |
domoindus.be | For your comfort and your security, DOMO INDUS selects, from more than 30 years, the best range of products. | comfort security, security domo | control, system, cctv, access, gate | 1 |
dotsconnect.be | Websites, webshops, wordpress, divi, woocommerce, custom development, 3D-modelling, 3D-animation, AR, VR, ... | host security | dot, connect, tailormade, host, case | 0 |
dotter17.be | Cosiness, warmth and pure indulgence, there lies the soul and power of Dotter17. In five spacious & comfortable rooms and a wonderful wellness area, guests can enjoy the peace and beauty of life. The nature reserve “den Dotter”, at the edge of the Flemish Ardennes, is waiting to be discovered… | breakfast, room, discover, completely, comfortable | 0 | |
doutu.be | Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development… | ensure security, security fraud | launch, duration, storage, view, device | 0 |
dpopro.be | dpo pro facilitates sharing experience and best practices through targeted events that help DPOs in their day-to-day activities. | cyber security, security coalition | member, notice, officer, connect, gdpr | 0 |
drbott.be | Security for legacy Mac OS X users: NTP Fix for Mac OS X 10.6 (Snow Leopard), 10.5 (Leopard) and 10.4 (Tiger) . | user, device, worldwide, germany, accessory | 1 | |
drewbarry.be | DREW BARRY AND MORE… OVERVIEW… CONCEPT & SKETCH… PRINT… PERSONAL… ABOUT… View… | security gate | view, draw, sketch, overview, print | 0 |
driesbanken.be | I provide Cloud and on premises infrastructure architecture and consultancy to several customers. | azure security, security engineer, infrastructure security, security architecture | azure, cloud, certify, microsoft, dry | 0 |
driexperts.be | DriExperts is the partner of well-being . We support you in your work of all kinds equipped with a successful track record . From plumbing to electricity , through heating and pipelines to finally look after your completion work (partitions, paint , tiles , parquet ... ) and cleaning . Our… | security expert | view, heating, plumbing, electricity, troubleshoot | 0 |
drivecity.be | An exceptional storage facility, offering indoor parking in exceptional security and maintenance conditions. | exceptional security, security maintenance | sale, storage, engineering, gb, exceptional | 1 |
dronedivision.be | Drone Division provides data-driven insights into the condition and (remaining) life of a structure through safe and non-destructive inspections. | extra security, security safety | safe, report, destructive, asset, industrial | 0 |
droprise.be | Ready to futureproof your business? To excel in efficiency, security and cost-effectiveness? Droprise can help by providing turnkey drone solutions tailor-made for your business needs. Working towards a solid, long-term partnership, we place the focus on results and personal support, which we… | efficiency security, security cost | dji, combo, system, dock, advice | 1 |
drugmand.be | The group Drugmand is since 1919 specialized in products for electro-technical applications. | security material | material, electrical, accessory, cable, nl | 0 |
drupalcamp.be | Dr. Merlijn Sebrechts is a senior researcher at imec and teaches at Ghent University. He develops deployment platforms and helps companies streamline how they deliver software in the cloud and on devices. He teaches topics such as Systems Design, Open Source ecosystems, and Computer Security… | web security, security engineering, late security, security good, computer security | ghent, drupal, topic, system, schedule | 2 |
druum.be | The best online casinos UK for real money in 2022. We ve compiled a list of the finest online casinos for players all over the world if you want to play casino games on the internet. We chose these casinos based on their promotions, bonuses, security, cash out options, reputation, software… | bonus security, security cash | contemporary, breakfast, artist, room, house | 1 |
dstyle.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, furniture, contemporary, interior, elegant | 1 |
duchateau.be | The security security of of the the casino casino is is highly highly advanced advanced MONOPOLY MONOPOLY Casino Casino runs runs an an exclusive exclusive VIP VIP program, program, by by invite invite only. only. You You won�t be be required required to to use use the the smart smart card card if… | security casino | flower, candle, basket, search, duchateau | 1 |
dulongetdule.be | « du long et du lé » is a familial craftsmen enterprise, specialized in the creation, edition and crafting of seats : armchairs, sofas, benches… | cookie security, security analytic | catalog, gallery, seat, associate, history | 0 |
dvdd.be | … | isolate security, security glass | country, spain, beautiful, sale, terrace | 0 |
dvhosting.be | DVHosting provides professional hosting solutions for customers and business customers. Shared Hosting, Reseller Hosting, VPS Servers, Domain Names, Office 365, SSL... | enhance security | host, vps, ssl, share, environment | 0 |
dwsoft.be | Security Keep your devices (mobility) and data (cloud computing) safe. Protect access and backup your data. Monitor problems before they occur and solve them before they take you down. | management security, security software | cloud, computing, environment, mobility, device | 4 |
dyconsultancy.be | Ervaring… Contact… Nederlands… | consultancy, engineering, foundation, automation, july | 0 | |
dynamate.be | The spark that powers IT | Dynamate | spark, consultant, engineer, dynamic, system | 0 | |
dynamicfusion.be | …technical design and development of the Fleques platform, working closely with my colleagues to create a seamless user experience and ensure the security and reliability of the platform. Overall, I am proud to have played a key role in the development and launch of this groundbreaking new… | network security, experience security, security reliability | dynamic, growth, hack, present, keynote | 2 |
e-coiffure.be | …My account… Contact… Contact 1… Contact 2… Home 1… Home 2… Home 3… Home 4… Home 5… Home 6… Home… | security enhance | onepage, single, analysis, report, grid | 0 |
e-qual.be | E-QUAL proposes you different types of trainings on IT matters | awareness, basic, core, network, tailor | 0 | |
eaglankurek.be | Then configure the KCD Account on the NetScaler. Under Security > AAA > KCD Accounts, add a new KCD account: | netscaler security, security aaa, system security, security option | server, user, certificate, technology, configure | 2 |
eaglecar.be | Eaglecar offers you a professional passenger transport service with quality cars. Today there are more than 1000 limousine companies in Belgium. Why choose Eaglecar, what difference can Eaglecar make to you? | race, price, eagle, register, passenger | 0 | |
easing.be | In 2005 company founder Kris was so disappointed in the market offering of home technologies that he quit his big-five consultancy job to start his own automation company. | technology, luxury, ease, cinema, methodology | 0 | |
easybi.be | Here is the next article about how to manage your Power BI Services object using Powershell ! In this article we will see how to retrieve the security of all the workspaces. | article security, security workspace | power, bi, admin, workspace, sql | 5 |
easynuts.be | We offer energy comparison and switching services from a panel of carefully selected providers. Easy Nuts will help you to get the best deals for electricity and gas. | maximum security, security good, flexibility security, security sim | easy, utility, immediately, energy, electricity | 0 |
easytransitions-ict.be | I worked with Vincent on common projects and contracts related to very important customers. Vincent is very focus, well structured and organised, and certainly reliable. He is a really customer oriented person, putting the customer at the centre of his interests. Vincent is also someone very nice… | security solution, network security, security system | proximus, manager, skill, clear, pleasure | 0 |
ecachim.be | From REACH (Registration, Evaluation, Authorization and Restriction of Chemicals) to CLP (Classification of Labelling and Packaging). | formula, discover, recipe, clp, reach | 0 | |
echelon.be | Echelon Labs provides a comprehensive suite of services aimed at fostering a secure business landscape. From conducting rigorous risk assessments and formulating robust policies to devising strategic security plans, we offer the expert guidance your business needs to fortify its defenses. | security compromise, strategic security, security plan, superior security, security consulting | lab, landscape, comprehensive, secure, enterprise | 8 |
echochamber.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | comics, synthetic, necessary, absolutely, basic | 1 |
ecomit.be | ECOMIT | We make IT happen! | cybersecurity, server, select, print, endpoint | 0 | |
econopolis.be | Econopolis is a financial investment boutique specialized in asset management, investment advice, economic and strategic advice and wealth coaching for institutions, companies, government institutions, families and individuals. | market, financial, energy, climate, economic | 0 | |
edara.be | Trends and Developments in Security Governance and Risk Management in the Fight Against Extremism... | development security, security governance | report, political, religious, society, european | 2 |
eddywillems.be | I’m a well-known expert in security and malware. I am a board member of three security industry organizations (EICAR, AVAR and LSEC) and the resident Security Evangelist and Global Security Officer at G DATA CyberDefense. I studied Computer Science at IHB and VUB and started working as a Systems… | cyber security, security expert, security evangelist, security analyst, expert security | speaker, keynote, cyber, organization, industry | 27 |
edito3.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | agency, editorial, method, necessary, powerful | 1 |
effectbe.webhosting.be | Control access and security: Set smart rules to control who has rights to access certain documents — particularly useful for documents of confidential nature | access security, security smart | capture, personalise, consultant, unify, process | 1 |
efr.be | …the Single Market and the competitiveness of the European financial sector with a consistent policy agenda and to encourage innovation. There is an opportunity for policymakers and the private sector to work together and to meet the challenges of climate, digital, and security transitions. | digital security, security transition | financial, european, member, chairman, market | 1 |
egonconsulting.be | Egon Consulting offers Freelance Microsoft SQL Server services in Belgium. Specialized in Performance Audit, Data Architecture, SSIS, SSRS, MDS, Azure Cloud | smart security | consulting, server, sql, microsoft, azure | 0 |
eiss.be | The European Institute of Social Security (EISS) is an international scientific organisation gathering people interested in the field of social security and social protection throughout Europe and beyond. It has a comparative, multi-national and multi-disciplinary approach to social security. | social security, security social, security eis, security expert, security ad | research, conference, researcher, young, blend | 9 |
eitciorg.webhosting.be | …domains of science and technology, including among others physical foundations of information processing, information and communication theory, cyber security, quantum computation and communication, artificial intelligence, neural sciences and the fundamental topological aspects of information. | cyber security, security quantum | institute, european, standard, competency, skill | 1 |
elausys.be | ELAUSYS is an engineering company who design and develop innovative solutions and products in the field of electronic, automation and robotic. ELAUSYS is a certified KNX manufacturer of the KNX Association, the worldwide standard for Building automation. | distributor security, security system | electronic, system, automation, gateway, shortage | 0 |
elcos.be | Our mission is to strengthen the EU and NATO defense and security capacity by delivering high-quality products and services. | defense security, security capacity | value, compliance, history, defense, market | 2 |
electric-star.be | Electric-Star is a multidisciplinary team specializing in the installation of electric vehicles charging stations and photovoltaic panels. With its expertise in the fields of electric vehicle charging, automation, electronics, telemetry and information sciences, our company benefits from more than… | electric, vehicle, star, estimate, request | 0 | |
elektratech.be | Our experienced electricians are highly trained in all aspects of electrical service, from office lighting and security systems to emergency repair. | lighting security, security system | meer, electrical, annual, fixture, electricity | 1 |
elisevandeplancke.be | The ultimate desired result of bridging is belonging – which is related to place, identity, and security, among others. Belonging, or being fully human, means more than having access. Belonging entails being respected at a basic level that includes the right to both co-create and make demands upon… | identity security, security fully | city, neighborhood, second, change, care | 1 |
elite-events.be | …financial management, visual creation and branding of the event, scenography, complex AV deployment and management of VIPs (Protocol and Security). We collaborated in 2023 on around 18 full projects for the satisfaction of our end client (the European Commission) and of course for our full… | protocol security, security project | elite, european, staff, need, internationally | 1 |
embassymalawi.be | IMMIGRATION (AMENDMENT) REGULATIONS, 2024 IN EXERCISE of the powers conferred by section 40 of the Immigration Act, I, DR. KENNETH REEVES ZIKHALE NG’OMA, Minister of Homeland Security, make the following | homeland security, security follow, health security | malawi, embassy, investment, republic, travel | 1 |
embracejewels.be | "After completing my degree in marketing, I went full steam ahead with my passion of jewelry and can also officially call myself a goldsmith. My mission is to offer the modern woman beautiful, quality and affordable jewelry, designed with love by me. Jewelry is my passion since day one." At… | embrace, jewel, jewelry, giftcard, order | 0 | |
eminentcoding.be | After launching your software at Eminent Coding, our commitment continues with comprehensive maintenance and support. We handle bug fixes, security updates, and functionality adjustments, ensuring your software runs smoothly. Our goal is to keep your software trouble-free, allowing you to focus on… | scalability security, security web, fix security, security update | eminent, idea, process, investment, need | 2 |
emmera.be | We can help you in those areas : consulting, Ciso As a Service, GDPR readiness, privacy, audit, confidentiality, security awareness, intelligence (Economic and Personal), OSINT, third party or supplier security assessment, Pre employment screening (Aka PES or integrity checking), physical… | cybersecurity security, security audit, service security, security cybersecurity, party security | cybersecurity, risk, ciso, awareness, range | 27 |
emsec.be | EMSEC provides consultancy and advisory services in Cyber Security and Network Security to various companies in the Banking, Energy and Telecom industries. We also support our clients in their application development projects. | cyber security, security network, cloud security, security application, emsec security | cyber, network, cloud, concern, industry | 22 |
emtsolutions.be | Note: we can not provide any security services seen we are not licensed as such a company, we will only provide the medical services. | consulting, med, medical, emergency, material | 1 | |
enabel.be | Enabel wants to contribute with its experience and expertise in five specific domains: Peace and Security, Climate Change and the Environment, Social and Economic Inequality, Urbanisation, and Human Mobility. | peace security, food security, security inclusive, security climate | enabel, agency, sustainable, global, education | 5 |
encodelabs.be | Add QR Credentials to Visitor Records. We convert the Visitor QR code into a working credential to be used as an entry badge on QR readers. | synchronise security, security center, operational security, security market | lab, encode, cr, plugin, clearance | 0 |
energymission.be | Frederik Loeckx is Managing Director of Flux50. He graduated in 1996 as electrical engineer at the University of Leuven with a master thesis on data security and public key infrastructures. In 2001, Frederik obtained a Master in Business Administration from the Vlerick Leuven Ghent Management… | datum security, security public, security specialist | energy, lab, innovation, manager, environment | 1 |
enfant-cache.be | …did not return, the babies were entrusted to an institution or to unknown relatives. These multiple separations affected the child's basic security, the parent-child relationship and the development of a secure attachment, even in the case of a post-war homecoming. Many still live or have… | basic security, security parent | child, jewish, hide, jews, war | 1 |
enforceit.be | This is a module where you might want to add some more information or an image, a link to your social media presence, or whatever makes sense for your site. | internet security, security nac | layer, switch, wireless, network, ut | 0 |
engineer-vacatures.be | De meeste voorkomende functies voor it engineers zijn software engineer , system engineer en netwerk engineer . Maar ook voor automation engineers en hardware engineers is er voldoende werk... | security engineer | engineer, mechanical, engineering, electrical, automation | 0 |
englebertpierre.be | Why should I upgrade to Internet Explorer 7? Microsoft has redesigned Internet Explorer from the ground up, with better security, new capabilities, and a whole new interface. Many changes resulted from the feedback of millions of users who tested prerelease versions of the new browser. The most… | well security, security new, improve security, security internet | portal, joomla, system, engine, dynamic | 1 |
epact.be | Come to us for solutions tailored to your business needs and requirements. For us, the performance of the IT infrastructure, the user experience and optimum security are all paramount. | optimum security, security paramount | cloud, continuity, cybersecurity, devops, workplace | 1 |
epilsoft.be | Our lasers target the melanin contained in the hair. This will transform the laser energy into heat. Which in turn will permanently destroy all the structures that participate in the production of hairs. Thus, any regrowth of hair whose bulb has been burned with the laser will be almost impossible. | hair, removal, leg, jersey, neck | 0 | |
epowerhr.be | Information security is a key mission for us and we are constantly raising the bar. We are very proud of our ISO certification. | information security, security key | integration, bcs, staff, efficiently, user | 1 |
equaly.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | technology, disease, innate, biological, system | 1 |
ergo-lab.be | Certain workplaces, such as the crucial control rooms or alarm centres in the security or transport sectors, require well-considered attention to ergonomics. For these, we help create ergonomic control rooms with targeted niche solutions, in collaboration with “Knürr® Consoles – A Vertiv Company”. | centre security, security transport, police security, security emergency | lab, ergonomic, chair, workplace, room | 2 |
ertms.be | …of ERTMS is one of the measures to create a Trans-European Network for rail. The ERTMS Users Group combines the knowledge and experience of its members to support the introduction of ERTMS and to assure that it will be a safe, reliable and interoperable system at reasonable and affordable costs. | user, network, railway, member, reliable | 0 | |
erwindeleux.be | The Mamita Alice Foundation was established in early 2017. It supports projects of organizations that work for underprivileged children in Peru. By supporting the activities of those organizations, the foundation offers vulnarable kids safety, security and opportunities, thereby creating a chance… | safety security, security opportunity | musician, music, italy, clarke, recording | 1 |
esolutions.be | E-Solutions acts as your trusted advisor for cyber security strategy and execution, covering IT, OT, and Cloud environments. We offer expert guidance and implementation services to safeguard your digital assets and operations against evolving threats, ensuring resilience and peace of mind. | cyber security, security strategy, cloud security, ot security, security control | cyber, strategy, ot, cloud, execution | 26 |
esp32-open-mac.be | This will improve security auditability, open up the possibility for features not supported in the proprietary implementation (for example, standards-compliant mesh networking), improve interoperability and make research into Wi-Fi networks with lots of nodes more affordable. | fi, wi, layer, network, reverse | 1 | |
espace-reve.be | We offer high quality material to our customers, resistant but also respectful and in accordance to Europe’s security norms . Thereby, the stitching of our inflatable castles, balls bath and football frenzy to rent are extremely strong , the material we use is not toxic and the compressors to… | europe security, security norm | view, mascot, game, pop, giant | 1 |
essc.be | We provide a complete security solution consisting of both quality products and supporting services. | complete security, security solution, passion security, security service | integration, investment, risk, physical, specialization | 3 |
estheface.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | nl, visitor, tanning, necessary, feature | 1 |
esupply.be | Automated goods transport in intralogistics processes: Freight transportation is often at the center of automation projects because of its great benefits. In fact, today’s automated warehouses use a variety of automated systems to speed up the flow of goods and increase security in the facilities. | good security, security facility | supply, chain, logistic, process, warehouse | 1 |
esus-it.be | ESUS IT is a well-known and respected online shop. We offer customers a wide range of memory for laptops and servers and SSDs, LAN. | memory, disk, expand, apple, list | 0 | |
etarastore.be | …en gegevensverwerking… Home… Invitations… Gift Sets… Keepsakes… Keepsake Frames… Christening… Silver… | safety security | care, accessory, toy, game, supply | 0 |
etenonlinebestellen.be | Data collected and processed: Privacy choices, Users’ profiles, IP addresses, Device identifiers, Authentication-derived identifiers, Device characteristics, Precise location data, Browsing and interaction data, Non-precise location data, User-provided data, Probabilistic identifiers | ensure security, security fraud | launch, duration, storage, view, device | 0 |
ethera.be | Security is as important to us as it is to you. We take care of the secure storage of your data and files. | domain, storage, host, vps, stack | 1 | |
eufc.be | Security, Borders, Police To promote the implementation of the Internal Security Strategy, law enforcement cooperation and the management of the Union’s external borders, the Internal Security Fund (ISF) has been set up. he ISF is composed of two instruments: | internal security, security strategy, security fund | network, innovation, country, fund, sme | 1 |
eufundingoverview.be | , International Cooperation, Key Enabling Technologies, Oceans and seas, Partnerships with Industry & MS, Plastics, Raw Materials, Research Infrastructures, Security, SMEs, Social Sciences and Humanities, Society, Space, The European Research Area (ERA), Transport, Manufacturing, Culture &… | infrastructures security, security sme | overview, funding, agency, european, handy | 1 |
euraxess.be | The Federal state, Communities and Regions are competent for different specific domains.. For example, visas and social security are a federal competence while funding for scientific research can be provided by Federal, Flemish and Walloon institutions. What matters most for researchers is that… | social security, security federal | researcher, funding, european, research, community | 1 |
eurocase.be | Eurocase Belux cases, bags, cable drums, cables, connectors, stages, music stands, sleeving, heatshrink, 19 inch rackiing, velcro, cable ties, Eurocase Belgium | case, cable, drum, bag, connector | 0 | |
eurocity.be | Based in Brussels, Belgium EUROCITY specialises in the supply of niche consultancy and resourcing solutions to clients in the Aerospace & ATM, Banking, Defence & Security, Telecommunications & Logistics Industries. Activities are spread throughout Europe and beyond including Belgium, The… | defense security, security expert, defence security, security telecommunication | consultancy, consultant, manager, supply, scope | 4 |
eurodefense.be | That the interest of EU members states is to acquire a capacity for rapid and effective decision making and action in the defence and security fields; | european security, security defence, defence security, security field, security challenge | european, defense, network, common, country | 3 |
euronavigator.be | are committed to transforming ideas into impactful realities, cementing our reputation as the premier choice for public affairs in Zagreb and the Western Balkans, with strong links in Brussels. We are passionate to deliver ideas that shape public policy. Join us, and let’s navigate the complexities | security defence | affair, zagreb, advocacy, government, political | 0 |
europalia.be | Various factors influence the strength and range of the Wi-Fi signal. If this is poor in some areas of your home, you have several options to strengthen the Wi-Fi. With these tips you can strengthen your Wi-Fi signal If the Wi-Fi connection is poor in some rooms of your... | network security, security home | europalia, network, fi, wi, router | 0 |
europe-at-work.be | …often on the web. This makes common rules to protect that information an absolute necessity. And the recent scandals with the American National Security Agency (NSA) collecting and using information also about European citizens without their knowledge and Facebook's supply of personal data of… | foreign security, security policy, energy security, security solidarity, national security | european, member, country, rule, citizen | 6 |
eurosecurity.be | Therefore, the company has progressed successfully in the fields of consultancy, the implementation of access controls (security code, tags, fingerprint recognition), the implementation of armoured locks, burglar-proof glazing, anti-theft retractable protection grids, and self-adhesive films as… | active security, security consultancy, deterrent security, security system, control security | armour, control, access, consultancy, license | 2 |
eurostag.be | SMART FLOW software is an Advanced Dynamic and Static Power System Analysis platform. It benefits from the renowned dynamic functions of EUROSTAG® and embeds a large set of static functions, from basic load flow computation to very advanced Security Constrained Optimal Power Flow. | advanced security, security constrain, static security, security analysis, dynamic security | system, smart, dynamic, license, static | 8 |
eusustel.be | Homepage of the EUSUSTEL project: European Sustainable Electricity; Comprehensive Analysis of Future European Demand and Generation of European Electricity and its Security of Supply | electricity security, security supply | european, electricity, demand, analysis, comprehensive | 5 |
euwatch.be | …in foreign policy decision-making: the Council (which brings together government ministers of the 27 member states), the European Commission, the European Parliament and the European External Action Service (EEAS) which is headed by the High Representative for Foreign and Security Policy (HRVP). | foreign security, security policy | watch, opinion, foreign, european, analysis | 1 |
ev1z.be | An affordable solution to set up a basic root CA with physical security for your sensitive keys. | information security, security comment, physical security, security sensitive, kind security | network, server, pi, dns, daily | 14 |
evchargingsolutions.be | 4. Application instances and potential customers In the new power vehicle industry, tailored pure copper belt fusing products are extensively utilized in the security management system of battery packs, successfully making sure the quick response and security of batteries under irregular problems… | directly security, security safety, thermal security, security processability, feature security | powder, material, copper, field, foam | 7 |
everdis.be | everdiS offers business consultancy services in the field of telecommunication networks. Specialized in the generation, transportation and management of rich contents, we do integrate those flows into a strengthened security architecture. everdiS will handle the complexity of things to deliver new… | strengthen security, security architecture | network, telecommunication, rich, general, sale | 2 |
evilwan.be | …site is not intended to educate the audience in all sorts of dangers that lie waiting on the worldwide network tubes, but rather to show random musings that are more or less related to cyber security. Topics may include forensic techniques, reverse engineering thoughts, cryptographic protocols,... | cyber security, security topic | evil, wan, file, java, naked | 1 |
evinox.be | …and their stainless steel structure ensures their long life . Everything has been designed to improve lives aboard caravans and boats . The security aspect is also a priority as all our hob and handsets are equipped with safety thermocouples . Evinox's savoir-faire is recognised by Raclet, CGI | life security, security aspect, boat security | sheet, welding, metal, hydraulic, stamp | 2 |
evoluware.be | …technological challenges in the fields of Renewable Energy, Demand Response based Grid Balancing, and Pluggable (Hybrid) Electric Vehicles. I have lead a team of R&D engineers developing two of these projects. I provide technology advise concerning software security and constraint programming. | information security, security secure, software security, security phd, security constraint | technology, fred, programming, secure, research | 16 |
evolve-tg.be | Providing modern day training solution within the domains of tactical medicine, situational awareness, night vision solutions, small arms, low light, ... for law abiding citizens, Military, Law Enforcement and Security personnel. | enforcement security, security personnel, security personel | evolve, law, course, enforcement, military | 5 |
ex-consulting.be | I started my career as a Freelance Security Consultant in July 2018. Since then I have worked on several long-term consultancy assignments in multiple sectors (healthcare, financial, government), as well as provided security training and performed penetration tests and provided Incident Response… | cyber security, security services, security consultancy, security consultant, security problem | consulting, consultant, cyber, vulnerability, education | 22 |
exabyte.be | © All rights reserved - Exabyte BV - Privacy & Cookie Policy | security awareness | manage, backup, print, network, cloud | 0 |
exigent.be | We always use the latest trusted technologies for our projets. This makes sure we comply with the latest security features, speed and quality. | late security, security feature, low security, security potentially | expectation, united, sporty, game, legacy | 3 |
expatservices.be | A particular area of human resources is global mobility. The term global mobility is very wide and needs interpretation depending on the case at hand. Bringing solutions to our customers from our different areas of expertise makes our team unique. Economical migration, social security legislation… | social security, security legislation, security taxis | expat, insight, tax, insurance, individual | 2 |
expatsis.be | fr… HOME… ABOUT… LINKS… | social security | nl, language | 0 |
experis.be | Experis offers IT resourcing, project solutions, and managed services, providing talent and services for digital age readiness. | important security, security alert | resource, consulting, cyber, workspace, cloud | 0 |
expertware.be | Managed IT Services Managed BI & Analytics Managed Security Service Provider Managed Multi-Cloud SAP Consulting & Support Managed SIEM Vulnerability scanning Data discovery and masking Cloud Optimization Next Generation SOC Network Access Control Managed EDR Network Monitoring Data Centre… | manage security, security services, cloud security, security audit, augmentation security | cloud, xpert, analytic, consulting, bi | 11 |
expo-factory.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | factory, exhibition, warhol, dream, american | 1 |
expressdrugmart.be | Brand Viagra is often the first treatment tried for erectile dysfunction in men and pulmonary ... | health security, security agency | buy, cialis, viagra, sildenafil, tadalafil | 0 |
extends.be | We also provide various services on demand. Security , analysis , hard & software installation / configuration , data recovery , (small) infrastructure / hosting , SEO , testing , benchmarking , integrations , reporting to name a few. | demand security, security analysis | extend, consultancy, integration, analysis, host | 1 |
f20.be | No PowerShell? No problem! Load embedded Python. Signed files and trusted by Microsoft Intelligent Security Graph. | intelligent security, security graph | powershell, python, common, correctly, easy | 1 |
f2s2.be | F2S2 wants to be your guide and lead towards improving safety and security for you, your family, friends and colleagues. | safety security, security family | road, safety, safe, campaign, successful | 1 |
faacbollard.be | Click… | high security, security bollard | js, size, share, thumbnail, list | 0 |
faatech.be | In this guide, we’ll be covering the best practices for security policies. Explaining the use of App-ID, security profiles, logging […] | faatech security, security network, practice security, security policy, id security | network, nsx, palo, load, vmware | 11 |
fannyleenknecht.be | XSRF-TOKEN Ensures visitor browsing-security by preventing cross-site request forgery. This cookie is essential for the security of the website and visitor. | visitor security, security cross, essential security, security website | expiry, http, visitor, user, consent | 3 |
favoriete-prijs.be | …destruction. This means, that your data is protected by entry controls (securely located servers, access to which is only granted under defined security procedures), admission controls (128-bit encoded data transmission, individual password, menu and employee authorisation, current virus software), | access security, security procedure, general security, location security, security measure | gdpr, declaration, address, processing, purpose | 2 |
fbnvangestelfund.be | We noticed that your browser does not support the latest technologies of web 2.0 and does not meet the standards in terms of security and display. This is why you may encounter problems loading this site. | term security, security display | fund, musician, bow, violin, browser | 1 |
fcvdendereh.be | Season… Team… Contact… News… Official… General… Sportive… Dender TV… Schedule… All matches… Ranking… | sheet, competition, dinner, friendly, general | 0 | |
fdfa.be | Policy framework… Treaties and MoU's… Diplomacy… Representation… EU Law… Important developments… | peace security | climate, science, trade, infrastructure, diplomacy | 0 |
fearfallsburning.be | …always be within reach. To achieve this effect, the use of quiet, unobtrusive instrumental music is particularly recommended. The feeling of security is extremely important when it comes to positively influencing a customer’s game decision. Higher, but always melodic sounds that are not… | feel security, security extremely | music, fear, fall, science, sound | 1 |
fedris.be | Fedris is a public institution of social security that ensures that the rights of the victims of occupational accidents and occupational diseases are being respected. Fedris took over all the missions of the former Fund for occupational accidents and the former Fund for occupational diseases… | social security, security right | occupational, disease, private, agency, federal | 1 |
fenego.be | Fenego guides and supports its customers in the rapidly evolving digital commerce landscape. Fenego's unique approach focuses on all facets of commerce. Ranging from strategy and development to security and cloud solutions for a complete commerce environment. | development security, security cloud | platinum, potential, technology, journey, career | 1 |
feys.be | Next time you have this problem, you can then type (blindly) ‘resetterminal’ to fix the problem. | kali security, security vulnerability | linux, window, category, author, january | 0 |
fieldtrust.be | FieldTrust actually delivers the Added Value, going beyond traditional distribution to provide innovative solutions that aim for growth for our vendor and reseller partners. | keeper security | vendor, backup, msp, access, value | 0 |
financeimmo.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | consent, user, finance, month, gdpr | 1 |
financialhealthcheck.be | A full-service digital bank. Earn on high interest savings accounts. No hidden fees. 100% digital. 100% transparent. | create, financial, banking, switch, inclusive | 0 | |
finatic.be | …reliably. Our services include interim management, consulting, payment strategy, training, software & product development, reengineering, IT & Cyber Security Assessment, digital transformation; discover why FINATIC services can help your firm below. FINATIC is a Registered Trademark of Finatic bv. | cyber security, security assessment | financial, payment, fast, cost, technology | 6 |
finegan.be | WORKING HOURS, PAY, SOCIAL SECURITY CONTRIBUTIONS… INTERVIEW WITH FÉDOUA EL AYOUBI FOR BFM BUSINESS | social security, security contribution | area, activity, view, independent, join | 1 |
finom.be | Your money is in safe hands because we strive to provide a high level of security to protect it: - With cutting-edge measures such as Passkeys and the added shield of 3D Secure, confidence accompanies every transaction. - Your account is exclusively linked to your smartphone, providing an… | security priority, level security, security cut, app security, security preference | payment, card, fee, month, limit | 3 |
finsel.be | We gladly assist you with all your (inter)national social security and personal income tax issues. | social security, security personal, security coverage, security situation | tax, requirement, income, legal, mobility | 11 |
fintechbelgium.be | A thriving digital finance industry to bring transparency, client-centricity, flexibility and security to all users and companies | flexibility security, security user | fintech, member, join, finance, community | 1 |
firstclasslimousine.be | FirstClass Limousine Services is a company based in Brussels specializing in the rental of limousines, Vans, minibusses, and buses with drivers. | visit security, security armour | airport, transfer, delegation, luxury, reserve | 0 |
fish-i.be | Our revolutionary web app ensures cutting-edge security while offering exceptional performance thanks to our AS3 hosting. You will be dazzled by the limitless customization flexibility, and our white label option allows professionals to highlight their brand in an exclusive way. Discover the… | edge security, security exceptional | fish, virtual, rate, capture, real | 1 |
fix-it.be | We are expert in IT maintenance, applications development and consultancy in medical imaging. We help companies to analyze and achieve their IT projects. | protection security | fix, imaging, consultancy, medical, infrastructure | 0 |
fixtheglitch.be | You can filter a glitch which fits your expertise, based on your profile (frontend, backend, mobile, security etc.), for now we start with frontend. In this way you get an idea of what we do at DPG Media IT. So if you get enthusiastic about fixing our awesome websites and apps, let us know… | mobile security, security etc | glitch, fix, dpg, netherlands, developer | 1 |
flanderscoast.be | Modern pop-art apartment with private parking, 5 minutes walk from the beach. Close to public transport (bus - 50m/ tram 300m). | coast, flander, map, floor, sunny | 0 | |
flega.be | Coty Craven: One of the worst experiences in my professional life was when I asked for captions and was greeted with reasons why it’s a bad idea and a security risk. So my advice for when you are a lead and you get a request to accommodate for someone: keep your doubts to yourself. The person… | idea security, security risk | game, booth, twitter, linkedin, print | 1 |
flexappart.be | The resident gives a mandate to FLEX appart to enter the premises to perform the maintenance or repair of the technical equipment, if applicable. FLEX appart also has the right to enter the rented premises for any emergency or security measure. | emergency security, security measure | flex, rental, accommodation, stay, apartment | 1 |
flexmail.be | Leave your email address and we will send you an occasional email with tips on copywriting, good (or bad) emails, marketing strategy and more. Just shy of liquid gold. | flexmail, result, target, discover, report | 0 | |
flexsys-project.be | Exploiting the enormous flexibility potential of aggregating distributed assets is crucial to maintain security of supply in the renewables-focused electricity system of the future. To make this happen, this project lays the missing groundwork in terms of academic knowledge, technology development… | tem security, security energy, crucial security, security supply | goal, timeline, deliverable, advisory, board | 2 |
flofiz.be | We guarantee for 5 years the replacement of the floats that wouldn't be watertight due to their fabrication. You return the non-watertight float and we give you a new float. | security float | float, pontoon, order, easy, capacity | 0 |
florisjanssens.be | Profiel… Ervaring… Vaardigheden… Projecten… | basic security, security project | database, server, java, duracell, sap | 0 |
flowers-belgium.be | City Flowers delivers bouquets, flower arrangements and potted plants all over the country.. We provide high-quality and fast flower delivery to Aalst , Brussels , Liege , Namur , Ghent , Bruges , Antwerp and many other cities in Belgium. We carefully choose florists, which allows us to guarantee… | confidentiality security, security information | order, flower, delivery, antwerp, birthday | 0 |
flowfactor.be | We want you to take ownership of your career, so we offer a generous education budget and encourage continuous learning. Whether you’re obsessed with automation or fascinated by cloud security, we’ll support your journey to mastering DevOps. | cloud security, security journey | devops, career, cloud, automation, developer | 1 |
flyprivate.be | When you fly with a commercial airline, you waste more time than you know. Driving to big city airports, stuck in traffic jams, waiting in security lines, getting to your gate, collecting luggage, ... | jam security, security line | private, aircraft, fly, airport, small | 1 |
focalpoint-sprl.be | Welcome to FOCAL POINT a Belgium established company since 2012, your trusted partner for cutting edge cyber security solutions. We understand that cyber-attacks are becoming increasingly sophisticated, and businesses need to be vigilant to protect themselves. Our team of experts is here to help… | cyber security, security solutions, security solution, range security, security assessment | cyber, risk, focal, advanced, research | 23 |
focd.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, absolutely, basic, feature, functionality | 1 |
focusonbusiness.be | Home… About… Solutions… Cloud… Business Continuity… IT security… Insight… Contact… Remote Support… | cloud, continuity, insight, remote, computing | 0 | |
foleys.be | After a major edit, it is advised that you create a backup, to do this, click "settings" -> Security -> Backup Website. This will download a zipped copy the website to your computer. | setting security, security backup | foley, irish, cheese, fry, onion | 1 |
fomas.be | Lately when I set up a Microsoft SQL server I’ll always implement SSL and a gMSA account to run SQL from. | mssql security | sql, ssl, posh, exchange, powershell | 0 |
foo.be | My interest primarily revolves around the elegance of computer science , especially the concept of “simple and surprisingly effective” as described by Edsger W. Dijkstra in EWD896 . I actively apply these principles in practice through free software crafting , information security, and information… | information security, security source, security information, security field, intelligence security | webpage, framework, interest, vulnerability, photography | 6 |
foonet.be | Working as a Principal Analyst in Product Management for Veeam Software with an interest in anything virtual and cloud with a strong focus on AWS, Azure and Microsoft 365. He is also a VMware Certified Professional, a Veeam Certified Architect and gained the VMware vExpert award (2012-2022). | veeam, backup, microsoft, aw, virtual | 0 | |
footfoot.be | …authorisation), the User shall bear full responsibility for his actions and compensate the Operator for all costs, complaints and losses resulting from the use of or access to, the Player Account by the third party. The User will have to take appropriate security measures regarding the Account. | c. security, security policy, party security, security system, identifi security | user, operator, shall, player, bet | 5 |
forelo.be | Forelo hosts the learning platform for CVO GENT. Everey day they offer us security, a professional approach and quality. Communication and support are always very swift and to-the-point. | day security, security professional | learn, host, approach, assist, clear | 1 |
forelshop.be | Abu Garcia… Berkley… FTM Hengels… Iron Trout… Mitchell… Paladin… Trout Master… Tubertini… Forelshop… | masu security, security wobbler | spoon, trout, herakles, garlic, berkley | 0 |
formalis.be | As an approved enterprise one-stop shop, Formalis can simplify your life. This is not just a slogan. Proof of this are its 34 decentralised offices, a galaxy of services, each one more essential than the other… and a revolutionary ONLINE tool ! | social security, security contribution | enterprise, self, legal, form, appropriate | 0 |
fortguild.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | workforce, demand, person, road, industrial | 1 |
fossaert.be | Categories Poland Tags bridge , Father Bernatek , Jerzy Kedziora , kazimierz , krakow , modern art , podgorze , Poland , sculpture | poland, category, author, tech, bridge | 0 | |
fournet.be | We do not just focus on the technical aspect, because we know that an infrastructure is only as strong as its weakest link. That is why we are committed to raising awareness within your organisation. This can be through cyber security awareness training, but also through tools and manuals for… | cyber security, security awareness, network security, security engineer | network, approach, trust, zero, care | 2 |
fredericcox.be | It worked on 4 platforms with a single codebase and we added some clever crypto-security for the video files so they could only be played from inside the application. | crypto security, security video | manager, operation, developer, screenshot, clearance | 1 |
freedownloads.be | Offering the best software for free is accessible to everyone and selecting free software by us is to spare you from unnecessary expensive purchases. All software that can be downloaded here are open source and freeware software. Open source software releases the source code so that anyone can… | communication security | program, browser, game, lot, great | 0 |
freeirancommunity.be | Some of the speakers include NCRI President-elect Maryam Rajavi, Vice President Mike Pence, former prime ministers Stephen Harper (Canada), and Guy Verhosftadt (Belgium), former National Security Advisors Amb. John Bolton and Gen. James Jones, former French foreign ministers Bernard Kouchner… | national security, security advisor | community, iranian, democratic, president, maryam | 1 |
freshfieldsnetwork.be | In this edition, we delve into the evolving landscape of FDI and national security regulations worldwide | national security, security regulation | firm, submenu, united, june, east | 1 |
frigne.be | resulting in delays at the departure gates. From the 4 gates the Airport was the proud owner, only 3 of them where operational, resulting in a 4th queue, after the normal security check. | extra security, security measure, queue security, security check, normal security | airport, family, gis, d., conference | 7 |
frigotransport.be | The family business Soncotra is specialised in the transport of goods to and from Western Europe, Central Europe, Eastern Europe, Russia, the CIS, the Balkans and the Middle East , Marocco and Tunisia. | door security, security remote | east, russia, balkans, middle, eastern | 0 |
fullcleaning.be | Very strict sub-contracting control (possible social security and tax debts) and Civil Liability insurance covering the works carried out by a subcontractor. | problem security, security suspect, social security, security tax | clean, control, gdpr, rate, general | 2 |
fundourportfolios.be | My final project for the Software Engineering major is on using the Security and Exchange Commission's API to gain financial insight in various companies. I worked closely with the Head of Research and Development at LYNX, one of the biggest brokerages in Belgium and the Netherlands. | major security, security exchange | b., resume, engineering, exchange, discover | 2 |
fundplus.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | fund, pharmaceutical, pipeline, cardiovascular, disease | 1 |
funnyhorse.be | The relaxed atmosphere allows you to relax in the best and unforgettable moments,because our house guarantees its customers security and impeccable discretion | customer security, security impeccable | peek, atmosphere, house, relaxed, discretion | 1 |
fusa.be | A Virtual server with SSD RAID storage hosted in Belgium, daily backups and a shared firewall already available from 20 Euro per month . | server, host, virtual, backup, month | 0 | |
futurwork.be | We fortify your digital security with advanced measures. FuturWork assesses your systems and identifies vulnerabilities to implement robust cybersecurity strategies, protecting your organization from potential threats | digital security, security advanced, application security, security vulnerability, regulation security | consulting, cloud, strategy, innovation, organization | 4 |
fwdmotion.be | fwdmotion – by Bert Bocanete | edit, search, rainbow, revolution, orange | 0 | |
fwf-wrestling.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | flemish, upcoming, academy, necessary, toggle | 1 |
fysxkinesitherapie.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, needling, dry, necessary, feature | 1 |
g3rt.be | Building a security operations team, or a new capability within such team is preferably done in-house as SOC capabilities need sufficient infrastructure and corporate context to be effective. Building know-how on the job is a lengthy process with lots of potential for catastrophic mistakes along… | security operation, security management, operation security, security specialist, infrastructure security | network, operation, response, cybersecurity, analysis | 40 |
gabor-construction.be | Gabor-Rainbow is a family company founded by Gàbor Gyozsàn near from Liège. Gabor-Rainbow is specialized in the sale of windows, French windows, entrance doors, garage doors and shutters in PVC and wood. | elegance security, security home | rainbow, window, checkout, entrance, color | 0 |
gaetanlongree.be | magna cum laude HENALLUX Namur (BE) June 2017 Thesis: Security Challenges Faced by Cloud Migration | thesis security, security cloud | internship, education, technology, lab, case | 1 |
gagotechnics.be | SERVICE CENTER… CONTACT… portrait of young businessman in casual clothes at modern startup bus… led… | datum security | center, control, ip, automation, gate | 0 |
gamstore.be | Star Wars Knights of the Old Republic Black Series Replica Force FX Elite Lightsaber Darth Revan | disney, craft, marvel, figure, war | 0 | |
gaps-ugent.be | The research group 'Governing Security & Policing' is located at the crossroads between governance, management and criminology. A governance perspective is used to study local, national and international problems related to crime, safety and security. GAPS is focused on (1) the changing nature of… | technology security, security follow, police security, security gap, group security | gap, research, university, brisbane, think | 7 |
gardenservices.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | garden, green, gardening, happy, lawn | 1 |
gastricbypass-recepten.be | Ensure security, security, prevent prevent and and detect detect fraud, fraud, and and fix fix errors | ensure security, security prevent | view, launch, storage, duration, precise | 1 |
gdpr.be | ISO 27701: Introducing a Privacy extension to the Information Security Management System of your organization | datum security, security blog, information security, security crucial, security management | gdpr, march, january, october, july | 12 |
gdsadvocaten.be | …with an emphasis on international sale, leasing, shipping, aviation, transport and logistic activities, agency, l/c, financing and security interests, corporate share purchase, insurance, anti-trust (competition) liabilities and recovery of secured and unsecured claims. GDS Advocaten… | act security, security interest, financing security | antwerp, law, firm, notice, trade | 3 |
geekness.be | You have to love ‘security’ tools that allow you to enter any domain / website, and start spamming the website without any decent confirmation that the specific website is under control of the person who is performing the scan. One … | misc, unix, smart, monarch, series | 7 | |
gene-electra.be | Welcome to Géné-Electra, audio-visual and interpretation equipment rental service with technical assistance. | equipment, interpretation, audiovisual, technical, visual | 0 | |
genericmeds.be | …the news… Buy Now… Viagra… Sildenafil Citrate… Cialis… Tadalafil… Kamagra Oral Jelly… Brand Viagra… | health security, security agency | buy, cialis, viagra, sildenafil, tadalafil | 0 |
genomicscore.be | With our cloud storage service, you no longer have to worry about long term storage, capacity, maintenance or security of your data. By opting for Gold Tier cloud storage , you no longer need to secure your own hardware or get worried about your NGS data get lost. | maintenance security, security datum | genomic, core, research, cloud, storage | 1 |
geochassis.be | Improve the security of your home by using GEO CHASSIS to install motorized or manual roller shutters. | window, geo, roller, assembly, roll | 1 | |
geoview.be | GeoView Enterprise edition enables running your corporate “cloud” solution for georeferenced imagery and video capturing, sharing and publishing. Leave security concerns behind, as your sensitive data stays behind your company’s firewall. It is you who decide how, what, where and when gets… | dataset security, security concern, publish security | edition, cloud, mapping, imagery, tutorial | 2 |
getyourway.be | Assisted reality (aR) allows displaying information in workers' field of vision while they are focusing on an active task with their hands free. It digitalizes the working processes and improves their comfort , their security and their efficiency . | comfort security, security efficiency | glass, smart, sight, reality, future | 2 |
ghelek.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, basic, properly, essential, category | 1 |
ghitti.be | My interests are the project management, Python, PHP, AI, data science, blockchain, healthcare and innovation. I have a very good contact with other ITs, clients or end-users. To stay up to date ( yes, I'm curious ), I invest numerous hours researching and learning technologies that best fit the… | security officer, information security, security foundation, cyber security, security vision | technology, scrum, clinical, scientist, innovation | 0 |
gicnetwork.be | This report analyses the state of siege declared in the provinces of North Kivu and Ituri since 2021. This Congolese government policy is deemed a failure, as the government’s efforts to reclaim control over its territory and address security issues have fallen short. | territory security, security issue | picture, network, report, paper, research | 1 |
gijsvanlaer.be | My name is Gijs Van Laer, I'm a cryptographic engineer and information security consultant. Currently, I'm working at XFA , but do not hesitate to reach out for advice or other small projects. Below you can find a few of the services I can provide, but feel free to reach out if you have any… | information security, security consultant, security advisor, ms security, security informatic | university, cryptographic, research, advice, engineer | 11 |
gillesameri.be | I can help with any part of WordPress, from the design of the front end and user interface to the development, maintenance, and security updates of plugins on the back end. | maintenance security, security update | developer, language, technology, process, user | 1 |
ginops.be | …include but are not limited to: Google, Facebook, Twitter, Adroll, MailChimp, Sucuri, Intercom and other social networks, advertising agencies, security firewalls, analytics companies and service providers. These services may also collect and use anonymous identifiers such as IP Address, HTTP… | agency security, security firewall | supplier, list, buy, taiwan, visitor | 1 |
gis-consultingshop.be | Many organisations have decided to self-manage data protection (regulated with the EU GDPR: General Data Protection Regulation) related matters and maybe appointed someone in the Legal or Security department to deal with the related topics. But is this person knowledgeable about data protection… | security awareness, information security, security place, security requirement, organisation security | gis, consulting, gdpr, awareness, control | 24 |
gisa-online.be | …a cent loss. In addition, the bonds still in circulation, as well as deposited as collateral for loans to Greek banks, the ECB could buy up securities at market value. The risks to the taxpayer with this reorganization concept are significantly lower than with a “haircut” or the continuation of | ecb security, security market, social security, security dm | debt, current, market, greece, success | 2 |
gitedurbuy.be | The entirely fenced garden guarantees a total security while kids and grown ups enjoy lovely summer nights and their great sunsets. | total security, security kid | room, night, lovely, view, cottage | 1 |
gitralogistics.be | With over 20 years of experience in utilizing third-party carriers, we deliver the flexibility, service, and security that you expect from us at Gitra Logistics. | service security, security gitra | logistic, handle, warehouse, steel, capacity | 1 |
glaude.be | . This is no problem in the first place, but might get a problem if you use plugins that require you to store security-relevant data in the config (like credentials). Thus you should always make sure to configure your webserver to deny access to Pico's | plugin security, security relevant | file, theme, url, directory, header | 1 |
glicogroup.be | As a partner of Reynaers Aluminium, we offer windows and doors that match comfort and security with great looks—for residential and business spaces. | comfort security, security great | glass, guarantee, outstanding, clear, innovation | 1 |
gluo.be | Eager to take your digitalJourney to the next level? Gluo can help you in your digital transformation! We automate your infrastructure! | kubernetes security | infrastructure, level, eager, kubernetes, locally | 0 |
gocreate.be | With hugely successful productions like Dagelijkse kost, Huis Gemaakt, Onze Natuur, Hoodie and Olly Wannabe, Hotel Hungaria has solidified its reputation as one of the country’s leading media and marketing houses. Yet Hotel Hungaria is making quite a mark with their security approach as well… | safe security, security environment, mark security, security approach, proactive security | interested, network, envelope, engineer, broadcast | 5 |
goldendrivers.be | Our chauffeurs are professionals with many years of experience, they are discrete, multilinguals and possess good local knowledge. They are well groomed with dark color suits, tie, and classic shoes. They possess medical clearance, after undergoing practical and physical medical tests for security… | test security, security excellent, driver security, security clearance | golden, driver, transportation, ground, quote | 1 |
goplay.be | …Why Women Kill… So Help Me Todd… NCIS: Sydney… The Man Who Fell to Earth… The Real Housewives of… | border security, security canada | love, island, uk, murder, crime | 0 |
gordigear.be | Australian camping and expedition company providing high-quality roof top tents, camper trailer tents and car awnings to a global market. | privacy security | roof, click, awning, australian, global | 0 |
gps-time.be | GPS Time & Security believes that employees should invest their valuable working time in creating added value. We do this by simplifying the administrative burden, offering insight to the entire organisation and supporting any form of flexibility. We achieve this result thanks to intuitive and… | planning security, security training, time security, security employee | integration, control, registration, innovative, access | 15 |
grantthornton.be | …support in addressing both global and local cybersecurity and privacy compliance needs. We assess the risks of cyberattacks and the maturity of security programs, and we recommend and implement workforce, process and technology solutions to protect information assets. Contact us for a solid… | maturity security, security program, social security, security law, security legislation | tax, thornton, grant, overview, advisory | 4 |
grasp.be | Even after the delivery of your website, we will continue to support you by monitoring the backups and security of your website on a daily basis, providing training and answering all your questions. We check the operation of your website at regular intervals and are also automatically notified if… | aspect security, security privacy, backup security, security website | linkedin, map, step, domain, late | 2 |
greagre.be | …condominium garden, the furniture can be adapted to your needs : or 3 debrooms, or 2 bedrooms and an office … The apartment is composed of : Security door – Videophone and Alarm system Fully equipped kitchen ( Smeg appliance ) with natural stone worktop Bathroom with jacuzzi bath and separate… | cellar security, security door, apartment security | rent, bathroom, terrace, glass, appliance | 3 |
greenhope.be | 35€/month (420€/year) provide a child resources for school, shelter, food and clothing without which, the child might not be able to attend school. | food security, security income | hope, green, child, farmer, poor | 0 |
gremibel.be | We place doors and frames with high-end materials, in order to provide you with maximum security while offering an elegant and modern design. | maximum security, security elegant | frame, wood, window, glaze, mosquito | 1 |
grottesdeneptune.be | A place of relaxation and discovery located in an exceptional setting. Explore the Neptune Caves to discover a fascinating underground world | extra security, security ticket | playground, exceptional, underground, discovery, fascinating | 0 |
groupwave.be | …consultation to ongoing support, ensuring that our services align seamlessly with your business goals. Our proactive approach anticipates potential risks and focuses on the security, reliability, and scalability of your IT infrastructure, so you can stay focused on driving your business forward. | robust security, security troubleshoot, risk security, security reliability | future, discover, career, closely, custom | 2 |
grsolutions.be | Want to take your sales skills to a new level? Then get coaching from Gilles Ryde, managing director of GR Solutions. | sale, academy, today, advisor, manage | 0 | |
gta-security.be | GTA Security installs and maintains your alarm and video surveillance system in your home or business. We put the latest innovations at the service of your security to protect your loved ones and your property. | gta security, security system, security install, service security, security one | system, property, install, late, innovation | 25 |
guygeelen.be | …management skills. You can expect an open and honest approach from me with as much attention for the journey as for the destination. In addition, a warm yet direct leadership style with focus on team building and team development . I am at my best with the necessary challenges and responsibilities. | involvement security, security analysis | manager, resume, skill, interactive, strong | 0 |
hackeragenda.be | The Open Open Web Web Application Application Security Security Project Project (OWASP) (OWASP) is is a a 501(c)(3) 501(c)(3) worldwide worldwide not-for-profit not-for-profit charitable charitable organization organization focused focused on on improving improving the the security security of of… | application security, security project, organization security, security software, software security | meetup, user, technology, php, api | 2 |
hact.be | The IT security landscape is evolving constantly and attackers are more and more into the human aspects. This is why we need to boost our defense by focusing on the human and teaching people how to react. Our security awareness program teaches employees how to behave securely both at work and at… | people security, security awareness, security news, late security, security thread | human, awareness, threat, cyber, technical | 9 |
hainautculturedemocratie.be | You’ll need to set up your utilities before you can move into your new home. This includes things like electricity, gas, water, and trash service. You can usually set up your utilities by calling the service provider and giving them your new address. Most service providers will need your Social… | unit security, security feature, extra security, security theft, lock security | system, space, mary, thing, house | 9 |
hanin.be | Depending on the technical restrictions imposed by the architecture of your building, your needs in terms of insulation, comfort, security and aesthetics, we will suggest the most suitable material, taking your budget into consideration. | comfort security, security aesthetic | glass, steel, window, material, break | 2 |
hannesvermote.be | About… Experience… Skills… Contact… Hannes VermoteHannes… | skill, engineer, system, user, patch | 0 | |
hardened.be | Application Security… Audits… Linux… Networking… Virtualization… Python… ReactJS… | network security | network, infrastructure, linux, virtualization, python | 0 |
hardwarespare.be | Application and data security Secure Solution Very secure solution with up to date industry security practices and inline with PCI compliance. Customer information protection with data encryption Install Now! | datum security, security secure, industry security, security practice | review, view, cart, write, cable | 1 |
harveynash.be | Application engineer Cloud engineer Cyber security Data engineer Devops engineer IT architect Support engineer | cyber security, security architect, security datum | harvey, recruitment, analyst, engineer, developer | 3 |
havoconsulting.be | “ I came in contact with HAVO through the recommendation of my colleague. Ever since we started collaborating a business level, HAVO has proven to be an excellent business partner by providing me with prompt and tailor-made solutions for each of my demands. HAVO lives by the words "do what you… | security audit, datacenter security, security manager, network security, security engineer | consulting, engineer, manager, network, functional | 0 |
hc-rent.be | Take a sustainable, stylish approach to travel with HC-Rent from Kluisbergen. Our electric microbus is perfect for road trips, parties, festivals, day trips... or just to make a great background in a photoshoot. Sound good? Buckle up! | rent, electrical, season, rental, price | 0 | |
hcode.be | This is the story of how my internet provider (Telenet) screwed up big time. I have a business account with them so I can have a fixed IP address … | th, ip, ssh, provider, story | 0 | |
hcsbvba.be | HCS uses technical security precautions to protect your data from manipulation, loss, destruction or access by unauthorized persons. Our infrastructure ensures continuous protection of data against all threats, including viruses and other types of malicious code. We use threat detection systems… | right security, security retention, technical security, security precaution | hcs, purpose, law, user, access | 2 |
headhuntersinbelgie.be | …agency providing consulting, headhunting and brand ambassadorship services. We value trust, reputation and long-term partnerships. Our focus is on senior SAP, cyber security and leadership positions in IT. We work with trusted clients on specific missions. Our approach is open and transparent. | cyber security, security leadership | executive, search, recruitment, consulting, associate | 1 |
hellobank.be | Online security Terms of use of the website Privacy Notice Cookies PSD2 Terms and conditions & rates BNP Paribas Fortis Developers Portal | online security, security term | hello, pay, payment, saving, offer | 6 |
herm.be | …hobby effectively became my job. So lucky to make a living for what I love to do most: IT, technology and innovation in general - shaping the world of tomorrow. This large set of interests results in a broad spectrum of IT knowledge and skills - applicable to any organization or project. | resume, infrastructure, skill, technology, cloud | 0 | |
hettoverstokje.be | Choose a job at Het Toverstokje and you can work at your own rhythm, with no stress , with an immediate result and close to home. Respect and appreciation, plus a punctual and proper wage are given priority at Het Toverstokje. | job security, security need | domestic, help, fairy, knight, clean | 0 |
heydari.be | Security and privacy for streaming, storages and data sharing systems: Zero-knowledge proofs ( ZKP ) & Encrypted search | security privacy | research, lab, system, previously, mpc | 3 |
heyselheartcenter.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | heart, center, visitor, necessary, feature | 1 |
hi10.be | Today 16 HI10 Consultants were present at the physical post covid Inner Circle education on Machine Learning 2. CNN, RNN, Image Recognition, Voice Recognition, Anomaly Detection. Today on the drawing board. Tomorrow in your projects. #java #javascript #machinelearning #hi10 #inspire | efficient security, security integration | integration, efficient, java, education, learn | 0 |
hifu-bruxelles.be | A HIFU session begins with a visual examination of the skin to determine the area to be treated. Once done, the HIFU device is applied to the skin with light pressure and high intensity ultrasound is applied to the target area. | security priority | treatment, lifting, price, session, skin | 0 |
highcounciloffinance.be | High-level experts, qualified to give opinions about any issues, general or specific, in the field of taxation and social security contributions. | social security, security contribution | finance, council, late, statistic, study | 3 |
hilink.be | Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. | functionality security, security feature | visitor, necessary, feature, functionality, functional | 1 |
hiqkru.be | Freelance network security consultant with 20+ years of experience focussing on software defined datacenters or clouds. hIQkru can help in many aspects like architecture, technology and product selection, implementation and troubleshooting. | freelance security, security consultant, network security | consultant, cloud, troubleshoot, selection, network | 10 |
hksolutions.be | HK Solutions… Home… Cyber Nieuws… Contact… | endpoint security, security solution | cyber, endpoint, industry, productivity, microsoft | 0 |
hodosoftware.be | I am Google Cloud - Certified Cloud Architect, Developer and Data engineer and I am in the process to obtain my certification on networking and security. | cloud, language, kubernetes, developer, java | 1 | |
hofterheidje.be | Terms of payment: 30% deposit payable at time of booking / balance payment and €500 security deposit are payable 4 weeks prior to arrival at the latest ( Rental and Booking Conditions ). | payment security, security deposit | ter, stay, holiday, surrounding, room | 1 |
holomorphe.be | I'm an IT guy who decided to help small organization to have clean IT. My main focus is cyber security but I can provide hardware, training and much more. Don't hesitate to reach out to me for any additional info. | colleague security, security process, update security, security patch, cyber security | cyber, user, enterprise, risk, threat | 14 |
honore.be | We all know that the amount of pension a person can expect to receive is not necessarily guaranteed. And because a net payment increase, is insignificant after tax and social security contributions, it might be advisable to set up a capital pension scheme for your employees or create a pensions… | social security, security contribution | insurance, cover, advice, offer, need | 1 |
hoornebert.be | …to create an Industry Cloud. An Industry cloud is a cloud platform that has been customized to fit a specific industry in order to accommodate the different vertical challenges and opportunities. Such as tailored scenarios, legal, compliance, security, but also allowing interoperability […] | compliance security, security interoperability | healthcare, azure, microsoft, health, interoperability | 1 |
horizon-europe-info-sessions.be | Webinar… DETAILS… All… General… FET… MSCA… ERC… ERC Synergy Grant Call 2025 – Belgian Webinar… ERC… | ethic security, security appraisal | erc, grant, general, session, proposal | 0 |
horseworldeu.be | The TWIN LOCK SYSTEM chin strap: a real revolution THE HIGHEST LEVEL OF SECURITY LEVELDOUBLE CERTIFICATIONEuropeane Certification EN 1384 2017VG1 Certificatio... | level security, security leveldouble | horse, lady, accessory, saddle, bit | 1 |
hosted-power.be | Pimcore… AtroPIM… Odoo… OroCRM… CiviCRM… Vtiger… Managed Hosting Oplossingen… Managed Cloud… | oplossing security | host, power, manage, cloud, stack | 0 |
hostico.be | Whether you are at the first project, or you have acquired knowledge in the domain, Hostico offers you all the necessary elements for your website to benefit from best functionality, security, and support at the highest level. | functionality security, security support, complete security, security authentication, advanced security | domain, host, cpanel, transfer, wizard | 4 |
hostingwordpress.be | Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. | layout, host, dolor, excepteur, domain | 0 | |
hostpapa.be | We take security seriously. Our servers have enhanced security features, firewalls, and intrusion detection. All hosting is secured with a free Let’s Encrypt SSL certificate. | server security, security feature, commitment security, mind security | host, domain, builder, server, certificate | 6 |
hostvps.be | We implement all possible security measurements and use quality hardware to protect your server | plan security, security measurement, datum security, security reliability, possible security | vps, server, spain, window, dedicate | 5 |
hoteldeswaen.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | facility, seminar, necessary, absolutely, basic | 1 |
hotelnewflanders.be | …known as Hotel des Flanders, dating back to 1890. During that time Sint Niklaas was a trader’s hub and this hotel was a popular junction for traders to dine and lodge, Today the Hotel New Flanders is revitalized and freshly renovated to offer you a luxurious experience in this historic building, | additional security, security hotel | flander, pleasant, comfortable, smile, stay | 0 |
housease.be | Reserve the property weeks or months in advance. As a security step, we transfer the advance payment to the landlord only after you arrive. | advance security, security step | property, rent, month, rental, inspector | 1 |
how-hard-can-it.be | Capture your delivery pipeline execution. The provisioning of an enterprise grade cloud platform. In the Cloud Runbooks. And the Cloud Reflections. | cloud, pipeline, delivery, technology, success | 0 | |
hu-production.be | We are the world's largest online support network. Ask questions. Get answers. Talk to others who've been there before. #UnlockYourHealth | security policy | health, network, community, uk, disease | 0 |
huett.be | The HÜTT consists of three modules and two compartments: a living module, a sleeping module, and a sanitary module, plus a technical compartment and a luggage compartment. | security safety | wanderlust, compartment, wall, system, space | 0 |
hugoputtaert.be | Radical Imagination. Integrated2019 was a biennial international art & design conference, which… | exhibition, conference, antwerp, print, graphic | 0 | |
huisjeindeprovence.be | Sainte – Maxime, Nice & Cannes…). The colored facades, balconies and shutters give this complex a typical Provence character. In A great sense of security reigns in the village, as the private domain is completely closed. Near the park (1 km) you will find a couple of supermarkets and shops and a… | sense security, security reign | residence, swimming, pool, house, domain | 1 |
hunna.be | As our society becomes ever more digitalized the impact of failing IT infrastructure will increase. The need for strong cybersecurity will increase in relation to the impact of the threats to the IT infrastructure. Experience has shown us again and again that systems are often built with security… | system security, security secondary, quality security, security solution, security development | system, usb, sanitation, threat, device | 7 |
hutix.be | Do you know the pitfalls of cybersecurity ? Want to build digital walls and help prevent data leaks? Be our IT security expert . | security expert, leak security | titans, consulting, kick, consultant, career | 3 |
huurvillafrankrijk.be | About us… The villa… Living room… Bedrooms… Sanitary… Outside… The village… Location in france… | double security, security little, high security, security standard, pool security | rent, bedroom, outside, room, pool | 0 |
hybridworkplace.be | the right tools and technologies so that people are constantly connected, regardless of the location; with attention for individual needs such as personal devices, of course, but also for innovation, well-being and sustainability. In this way, work and life can be nicely balanced, everyone’s… | computer security, printer security | print, workplace, approach, inclusive, employee | 0 |
hyperion.be | Why trouble yourself with day-to-day upkeep of your infrastructure. Focus on what you do best and let us take care of digital maintenance, security and improvements while we continuously anticipate your next step. | maintenance security, security improvement | talented, network, closely, future, automation | 1 |
hyperlab.be | Medialife is a Belgian production house focused on creating immersive digital content and moving images. One of their many services is placing security cameras in and around construction sites. To take their offering to the next level, we developed a solution that securely archives the images… | service security, security camera | fast, competitor, cloud, problem, technology | 2 |
i-force.be | tech partners… referenties… contact us… [email protected]… expertise… fraud prevention & detection… | service security, security integrity | fact, find, forensic, litigation, academy | 0 |
i-lan.be | This compact, high-performance device seamlessly manages compute, networking, security, and backup systems, ensuring that your servers, applications, and data remain encrypted, protected, and easily accessible inside these Edge systems throughout the whole world. | network security, security backup, performance security, security compliance, advanced security | lan, edge, infrastructure, cloud, technology | 5 |
i-system.be | Creating a tailored video security system needs a huge experience to ensure a really usefull and effective system. | year security, security automation, video security, security system | system, automation, access, staff, need | 3 |
iban.be | ARKéA DIRECT DIRECT BANK BANK (NOM (NOM COMMERCIAL COMMERCIAL / / COMMERCIëLE COMMERCIëLE NAAM: NAAM: KEYTRADE KEYTRADE BANK) | paribas security, security services | iban, bic, india, bnp, paribas | 0 |
ibanberekenen.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | ensure security, security fraud | launch, duration, storage, view, device | 0 |
iccwbo.be | We fight for sound business ethics, more effective governance, rule of law and security at all levels of international trade. | law security, security level | trade, global, arbitration, industry, award | 1 |
ichibanconsult.be | to employers, employees and individuals on taxation matters, international tax treaties, social security and legal issues on cross-border professional activities or international migration to and from Belgium. About us | social security, security legal, security taxation | tax, taxation, thought, employment, advice | 3 |
icounter.be | Has your professional bank account number changed, or are you moving house and do you need to complete a number of formalities? Request everything here in just a few clicks. | social security, security fund | number, vat, self, counter, extract | 0 |
ict-network.be | ICT-Network introduces you to the right opportunities in Information and Communication Technology recruitment; we have a very large database of all kinds of IT profiles such as: IT Manager, Software Developer, Database, Business Intelligence, SAP, IT Security, Network, Systems Engineer and many… | sap security, security network | network, profile, recruitment, consultant, candidate | 1 |
ict4employees.be | …Services & Garanties… Anti-spam - Esd… Antivirus - Esd… Back-up & Storage Management -… | security software | power, controller, projector, storage, drive | 0 |
ideca.be | Ideca provides management services for mid-sized and big companies, as well as a set of other services: | testimonial, advice, server, specific, permission | 0 | |
identityfraud.be | In order to ensure maximum effectiveness and efficiency we rely on our extensive network of private detectives, European forensic service firms and specialized security equipment providers. | necessary security, security measure, security level, detail security, security assessment | identity, fake, domain, report, case | 9 |
iee.be | High quality maintenance, on line and hot tapping services which helps prevent production loss, improving the reliability and security of your facilities.” | reliability security, security facility | valve, oil, control, chemical, power | 1 |
ifrd.be | International Federation: Algeria Perpetuates Security Repression by Imprisoning Journalists &... | return security, security repression, perpetuate security | federation, release, human, saudi, manifesto | 4 |
igsprotect.be | This activity is distinguished from other guarding activities because it does not consist so much in monitoring and protecting property but rather in monitoring the behavior of people. Therefore, this activity covers in particular the organization of doorman services, event security and store… | sprl security, security heart, security serenity, protection security, security agent | protect, activity, property, authorization, control | 30 |
ikkiapp.be | Yes, data security is paramount at IKKI. We employ blockchain and advanced data protection measures to ensure your information is secure and confidential. | datum security, security paramount | technology, career, blockchain, individual, advanced | 1 |
ils.be | Security on ships is a constantly evolving field, requiring adaptation to the ever-changing nature of threats in both physical and digital realms. | safety security, security seriously, security ship | lash, system, supplier, material, cargo | 7 |
imageplus.be | We offer digital consulting services based on over 20 years of experience, helping clients transition to digital processes to improve efficiency, accuracy, and security. | consultancy, digitization, help, custom, consulting | 1 | |
imengine.be | Imengine Creative & analytic agency - Imengine | privacybeleid security | analytic, agency, creative, developer, manage | 0 |
immizen.be | Immizen is an immigration consulting company . We assist our clients in identifying the best opportunities to settle in Belgium . We simplify the immigration process , by defining the context of your immigration and assisting you throughout all administrative procedures . | social security, security assistance | process, migration, permit, easy, card | 0 |
immuneit.be | Mastering your expertise is a strength, but maintaining it is an art. With us, we empower you to continually achieve your aspirations. Through personalized projects and a supportive environment, we ensure your happiness and security, enabling you to deliver exceptional results to clients and… | happiness security, security exceptional | immune, salary, consultant, future, happy | 1 |
imug.be | We want to help our customers in delivering high-quality, reliable, integrated and trusted data to your business solutions. Our consultants are certified information management specialists, senior business consultants, technical experts and professional instructors delivering services to… | quality security | technology, ibm, technical, database, area | 0 |
incident.be | We handle complex emergencies, environmental incidents and accidents with dangerous goods and we have trained incident response teams, that is to say well-trained, experienced people with the right material for almost all incidents. | load security | fire, safety, response, dangerous, vacancy | 0 |
incorp.be | Identities are not only the digital version of humans. Every subject capable of accessing your data or business-critical assets must be digitally managed as an Identity. We would be happy to explain you how we engaged ourself in Identity-centric Cybersecurity practices. | identity security | identity, iam, asset, assessment, cybersecurity | 0 |
indicators.be | End hunger, achieve food security and improved nutrition and promote sustainable agriculture | food security, security nutrition | sustainable, goal, consumption, energy, poverty | 3 |
infocura.be | Infocura is a powerhouse of expertise in database management, boasting profound skills and knowledge in systems like Db2, SQL Server, and Oracle. With a team of seasoned professionals, the company delivers premier solutions, ensuring optimal performance, security, and efficiency of database… | performance security, security efficiency | technology, integration, monitor, area, consultancy | 1 |
infrawave.be | The heat from the infrared sauna relaxes the body's muscles, improves circulation, and stimulates the release of endorphins. Endorphins are the body’s all-natural "feel good" chemical and their release provide a truly wonderful "afterglow”. Besides physiological changes, an infrared sauna provides… | opt security, security good | infrared, heater, body, heat, health | 0 |
inno4def.be | Research, development and innovation play a crucial role in Belgian Defence's development, fostering progress not only in security and defence but also driving economic growth, reinforcing our technological base and providing promising prospects for individuals. This strengthens the Defence-Nation… | progress security, security defence, worldwide security, security threat | innovation, defence, challenge, idea, community | 2 |
insaneprogramming.be | InSaneProgramming is a blog dedicated to information technology that appeared on the Internet a few years ago. The main topics we cover are: Information security how to store and transfer datahow to properly delete informationhow to restore dataaccess control and management… | information security, security datahow | programming, plugin, story, translation, forever | 1 |
inspirehealth.be | Cybersecurity is a hot topic and therefore we are also organized with several IT and OT security expert centers that can guide and assist you through the all kinds of cybersecurity measures, ranging from identity management and access control over secure hosting solutions to data protection, data… | ot security, security expert | healthcare, crono, system, eco, community | 2 |
instakey.be | Privacy & Security… Terms of… | privacy security | access, house, smart, reserve | 0 |
integrate-it.be | Integrate-IT has a complete technology portfolio going from the classic network, high density Wi-Fi, Mobile device Management, network security to innovating storage and archiving solutions built on innovative technologies providing total approach solutions.... | infrastructure security, network security, security policy, perimeter security, security storage | network, integrate, fresh, tco, technology | 7 |
intensity.be | Intensity – When quality matters | quality security, security mind | intensity, form, strong, apple, especially | 0 |
inter-secom.be | Founded in 2011, Inter Secom Production is a company specializing in the installation and repair of internet and telephone networks for businesses and individuals, for the benefit of major leaders in the Belgian telecommunications market. | field security, security connect | isp, motivate, smart, repair, recruitment | 0 |
interdc.be | based in Doetinchem, Enschede & Hengelo, The Netherlands. Our focus is on providing datacenter services for regional companies, twin dc setup, or even as an excellent fallback solution to the broader market. Thereby at InterDC we pride ourselves in having both an ISO 27001 and a NEN7510 certificate. | request, quote, connectivity, netherlands, private | 0 | |
interfast-intl.be | Our highly qualified technicians have in-depth technical expertise in a wide range of computer fields. Whether it's network, security, backup, or hardware maintenance issues, our team is trained to tackle any challenge. | network security, security backup, wifi security, security audit, website security | need, individual, remote, buy, advice | 10 |
interit.be | 365… Microsoft Teams… Call Connect… store… Servers en storage… Back-up en disaster recovery… Public en… | security audit | zero, microsoft, connect, store, secure | 0 |
interligo.be | Our end to end managed service offering provides customers with an SLA and KPI driven agreement that enables their own organization to focus on their core business. | network, technology, switch, need, infrastructure | 0 | |
interlinked.be | Event these events have a network present! Think about the cash points which need a connection, or the internal crew that needs to be able to communicate with each other. Or you can also provide public Wi-Fi for the guests. | network, reliably, connection, connect, fi | 0 | |
intermade.be | Development of applications around the latest technology React & React Native, Externally or in-house, Prototyping & Proof-Of-Concept, Application architecture, Security. | sharepoint, spain, governance, technology, technical | 1 | |
internationalhouseleuven.be | The International House Leuven (IHL) is a non-profit that helps internationals get settled, find work, and establish a community in and around Leuven. | social security, security healthcare | house, dutch, insurance, emergency, activity | 0 |
internationalitconsulting.be | Based on 25 years of experience working for leading organisations we have helped many clients solving issues in their data center, their infrastructure or their security. Whatever the scope, we will strive towards the highest possible reward in the consulting business: the client's compliments… | information security, security task, infrastructure security, security scope, security risk | consulting, center, sample, infrastructure, cloud | 4 |
internetsociety.be | Internet is proving to be one of the most powerful amplifiers of speech every invented. Internet is becoming the repository of all we have accomplished as a society. Internet can facilitate democratic practices. BUT… it won’t be unless WE make it so. | society, governance, trust, community, encryption | 0 | |
investor-am.be | …investors, who have confirmed in writing to adhere to the status of well-informed investor, and investing a minimum of 250,000 EUR (by investor and by category of securities) - as per Art. 5, § 1er, 2°of the Belgian law of 19 April 2014 on alternative investment funds and their managers. | category security, security art, fund security, security act, regulation security | investor, fund, investment, nl, law | 3 |
inzelab.be | The earth’s climate is changing rapidly and the development, by breeding, of new high-yielding and climate adapted varieties of agricultural crops is currently too low to tackle forthcoming threats to food security. The EU-funded BREEDIT project developed an innovative breeding strategy to quickly… | food security, security eu | lab, research, innovative, old, theme | 1 |
iot-solutions-accelerator.be | NVISO exclusively focuses on cyber security services with an extensive expertise in security-critical industries like financial services, government and defense and the technology sector. | iot security, security sensor, cyber security, security service, expertise security | iot, accelerator, technology, innovation, program | 3 |
ip3.be | IP3 - CONSULTING in TECHNOLOGY & CYBER SECURITY | cyber security, security consulting | consulting, technology, cyber, consultancy, cybersecurity | 0 |
ipa.be | public works - are the regions (Flanders, Wallonia and Brussels) and personal matters - such as education, culture and welfare - to the Communities (Flemish, French and German), with an overarching federal government for the whole territory, jurisdiction include defense, justice and social security. | ipa, language, history, form, director | 1 | |
ipgsgroup.be | IPGS Group is active in the private security sector, services and technological solutions. Driven by passion, IPGS puts its solutions and the human skills of its employees to work for the benefit of the customer's requirements | group security, security risk, solution security, security company, store security | hostess, control, asset, store, handler | 48 |
ipisresearch.be | Do you want to receive the IPIS briefing with a selection of articles, news and updates on natural resources, armed conflict, business and human rights, and arms trade? The IPIS briefing also includes a topical editorial and related articles, and updates on IPIS’ research findings, new maps… | research, human, trade, peace, mapping | 0 | |
irishmarys.be | After a major edit, it is advised that you create a backup, to do this, click "settings" -> Security -> Backup Website. This will download a zipped copy of the website to your computer. | setting security, security backup | mary, irish, range, booking, gallery | 1 |
ironpeak.be | Review your applications, harden your applications and help embed security in your design. | code security, app security, system security, embed security, security design | cybersecurity, consulting, risk, testing, penetration | 13 |
is4u.be | AI is not just a buzzword; it’s revolutionizing industries, especially cybersecurity. Therefor we are thrilled to invite you to CyberHealth “The role of AI in Security Automation” . | ai security, security automation, solution security, security seamless, thales security | identity, access, resource, governance, ibm | 7 |
isaca.be | Belgian companies rely on digitalization more than ever. However, due to the rise in cyberattacks, security breaches and the misuse of personal data, trust in the digital world has become increasingly at risk. | cyberattack security, security breach, information security | chapter, trust, cybersecurity, partnership, member | 11 |
isb.be | Since 1951, ISB has welcomed thousands of students and their families from Belgium and across the world. As the oldest International School in Brussels, ISB is driven by a powerful mission of developing International Citizens and Independent Learners in an environment in which everyone is… | security transport | community, learn, password, early, form | 0 |
iseecure.be | Belgium and Luxembourg IT managed security services provider. Managed Detection and Response. Security Operational Centre. | luxembourg security, security service, response security, security operational, operational security | response, remediation, soc, detection, attack | 12 |
ista-webportal.be | We are aware of the questions this may raise, but this step is intended to comply with the latest security standards, ensuring the secure management of your data and our Web Portal. | late security, security standard | portal, user, manual, profile, change | 1 |
it-lines.be | 07 Jun, 2024 in ai developers , anthropic , anthropic claude 3 , artificial intelligence , Big Data , Cybersecurity , Developer , Developers , GPT-4 , Innovation , International , large language models , openai , Security , Security News 0 | security newsfeed, late security, digital security, security line, line security | line, cloud, developer, computing, aw | 24 |
it-tude.be | IT-tude is located in Lens (Belgium – Hainaut) and provides its customers with reliable and secure IT solutions. along the main steps of your IT project: | presentation, advice, reliable, secure, step | 0 | |
it2.be | The major security hole in PayPal payments without requesting a password and security question is that it leaves the account vulnerable to unauthorized access. Without these additional layers of security, anyone who gains access to the device or account linked to PayPal can make payments without… | area security, security camera, regulation security, major security, security hole | storage, gb, device, space, potential | 10 |
itenium.be | About a year ago, I've decided to make the transition from employee to freelancer. It was during that time that the Itenium team helped me in finding my first project as a freelancer. Now, after working on this project for quite some time, I can really confirm that the Itenium team did a great job… | consultancy, setup, synology, jun, request | 0 | |
iternia.be | Security Our information is connected to an increasingly hostile global network. Does your environment contain a proper set of risk controls when reviewed in relation to the size, type and sensitivity of your data? Are cloud solutions as security sensitive as they are often percepted? There’s a… | solution security, security sensitive, endless security, security question, question security | cloud, subscribe, story, continuity, technical | 4 |
itigate.be | itigate delivered a long term, part-time, networking specialist to assist at our customer security and networking requirements. | customer security, security network | engineer, infrastructure, line, network, deployment | 1 |
itinfrastructure.be | …efficiency. Panduit offers a wide range of solutions including cabinets, racks, and enclosures, thermal management, data center software, fiber optic and copper systems, power, environmental and security hardware, as well as wire identification, routing, management, and protection solutions. | environmental security, security hardware, routers security, security servers | infrastructure, congress, program, register, access | 2 |
itjobonly.be | OnlySalesJob and Datanewsjobs: Browse all the jobs in Sales and IT and apply online. Sales jobs are on Onlysalesjob. IT jobs are on Datanewsjobs | security engineer | technology, antwerp, sale, engineer, manager | 0 |
itovate.be | When you choose to outsource your IT, you can continue to focus on the core business of your company and not have to worry about security, networking, installing and maintaining soft and hardware, and other IT issues. | company security, security soft, security audit | discover, cloud, sme, core, task | 9 |
itquality.be | …project management for European projects, and deep IT understanding. At IT QUALITY, we’re more than a startup; we’re a movement towards a brighter, more inclusive, and technologically advanced future. Join us on this transformative journey and experience innovation that makes a positive impact. | support security, security digital | testing, meticulously, dream, tech, inclusive | 0 |
itselect.be | Since 1996, from Computer Mind to Selection cs, we are specialized in delivering IT services to medium-sized businesses with our tailored Managed Services. Businesses with 10 – 50 staff fall into a gap where they are too large for small IT companies, but too small to have their own in-house IT… | network security, security alerts | selection, cs, network, global, template | 0 |
itsinabox.be | To avoid cookies, you can change the security settings in your web browser. How these are adjusted depends on which web browser you have. | cookie security, security setting | box, register, browser, setting, visitor | 1 |
itsmf.be | There are a number of forces at play in our industry that are pulling organisations in different directions and either deadlocks innovation and improvements in how we deliver digital solutions or wreak havoc with the stability and security we are also trying to establish. SRE is often implemented… | stability security, security sre | member, reduction, industry, access, order | 1 |
itsolve.be | At itsolve safety is our top priority, delivering services with utmost quality. Our commitment shines through, day and night. Ensuring a better & reliable system, leaving competitors out of sight. | system, reliable, priority, career, night | 0 | |
ittec.be | Optimize your digital infrastructure with our comprehensive system and network engineering services. From designing robust architectures to implementing scalable solutions, we ensure seamless connectivity, security, and performance for your organization’s IT ecosystem. Enabling smooth operations… | connectivity security, security performance | future, engineering, system, growth, scalable | 1 |
ittopics.be | …e-commerce Federal information standards (FIPS) Health IT Information Technology Internet of Things (IoT) Interoperability testing Mobile Networking News Privacy Security Security Software research Trends Trends Usability & human factors Usability & human factors Virtual / augmented reality | privacy security, security software | topic, human, usability, system, technology | 5 |
itworks.be | I.T. Works has been organizing seminars and workshops on technical and business IT topics since 1992. Our high-quality, information-packed, vendor-independent events provide solutions to the problems that many IT and business professionals face today. | problem, knowledge, skill, seminar, analysis | 0 | |
iunknown.be | active directory C++ com cryptography development funny Group Policy hotsauce internet journal Local Security Policy LSA memory-management nihongo onikudaki personal politics powershell random Registry Security socialmedia soup SQL Server transaction win32 windows 日本語 | local security, security authority, large security, security setting, security policy | june, slice, soup, thing, server | 8 |
iuris-link.be | Access to your files on a secure site, as well as the possibility for debtors to settle their debts online are guaranteed by strict security standards. | datum security, strict security, security standard | access, debtor, debt, amicable, judicial | 2 |
iwallet.be | Will 2014 be the year of the iWallet? Well, it all depends on what you think an iWallet should be. My iWallet is in need of an upgrade, that’s for sure. I’ll put it... | security software, bio security | payment, admin, wallet, revolution, technology | 0 |
iwish.be | Your browser is out of date. It contains security vulnerabilities and may not display the content of this page properly. Please update your browser. | date security, security vulnerability | problem, owner, language, properly, vulnerability | 1 |
ixit.be | We offer a complete range of Layer 3 switch solutions that add performance, security, and value to your network, providing intelligent desktop, workgroup and core connectivity at speeds up to and exceeding 1Gbps, prioritizing wire-speed connectivity. | performance security, security value | network, switch, order, meer, speed | 1 |
jaasondemol.be | Moi… Contact… L.L. Concept… Logo… continue reading… Mise en page… Star Jedi… Character Design… | march, lorem, ipsum, star, character | 0 | |
jacobsautocars.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, basic, properly, essential, category | 1 |
jamaica-brussels.be | Embassy of Jamaica and Jamaica Mission to the European Union - Jamaica Embassy, Brussels – | jamaica, embassy, european, consular, fee | 0 | |
jamesanderson.be | As a business owner & certified consultant, I has helped numerous businesses implement IT strategies for more than 15 years. With a strong understanding of enterprise vision & information technology, I develop initiatives that meet your objectives. | current security, security posture | james, anderson, objective, strategy, advisor | 0 |
janssens-serrurier.be | Because a commercial security camera system has to produce results, we offer what most security camera companies can’t. For CCTV installation companies, it’s important to treat cctv camera installation with a modern approach. Our security camera system installation department is just passionate… | business security, security system, assortment security, security camera, home security | system, smart, detection, building, fire | 68 |
jappalehfoundation.be | Jappaleh Foundation Europe (JFE) is a Non-Governmental-Organisation (NGO) in Belgium. It closely cooperates with sister organisations established in The Netherlands and Africa. JFE mainly focuses on the following sectors or themes: | food security, security employment | foundation, africa, objective, ghana, poverty | 0 |
jarvislgg.be | Our dynamic team, certified under the IATA's Dangerous Goods Regulation (DGR), ensures the safe transport of a diverse range of goods. From air freight to oversize and express shipments, we've got you covered with specialized docks and a commitment to security | logistic, easy, warehousing, airport, secure | 1 | |
jarviss.be | Your personal IT & OT Networks Security Service. Jarviss insures security & protects the continuity of your business with a personal approach. | network security, security service, jarviss security, security continuity, infrastructure security | network, cybersecurity, manage, approach, ot | 11 |
jbouquet.be | Dashboard… Floorplan… Switches… Scenes… Temperature… Weather… Utility… Hardware… Devices… Settings… | security panel | month, rainfall, device, user, custom | 0 |
jeanclaudellp.be | Our legal translation team provides an accurate rendering, in French or English, of documents originally produced in the other language: securities law-related documents, such as prospectuses and continuous disclosure documents; or legal agreements of all varieties—regardless of their level of… | language security, security law | llp, law, firm, legal, translation | 1 |
jeeproductions.be | Home… Artists… | security dancer | artist, dancer, music, fashion, meer | 0 |
jefferies.be | …criteria , for instance only pull through those from a certain Plan Type. Our Objective: Here I will be demonstrating how to apply granular security to your Planning application's substitution variables within Apex , it will incorporate a lot from previous blog posts but I will try and point… | import security, security export, export security, useful security, security setting | apex, cloud, epm, oracle, api | 5 |
jelke.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | hoodie, tshirt, pocket, zipper, sunglass | 1 |
jensd.be | SELinux is often seen as an evil, complex, unnecessary and especially annoying security component which exists in a lot of Linux distributions. Often you can hear something like: “Disable SELinux and try again” or , “The first thing I do on a new server is to disable SELinux”. The problem with… | window security, security app, rhel security, security reply, annoying security | reply, window, macos, linux, centos | 11 |
jensdufour.be | The Prelude: What Is Microsoft Intune? Microsoft Intune isn’t just a buzzword—it’s a cloud-based symphony of endpoint management and security. Imagine a conductor orchestrating a harmonious blend of user access, app management, and device wizardry across a cosmic array of gadgets. We’re talking… | management security, security conductor | cloud, intune, device, endpoint, android | 1 |
jenshermans.be | Before that I was a researcher at the COSIC group, department of Electrical Engineering, KU Leuven. My main research topic is security and cryptography for the real world . More specifically I worked on the analysis and design of protocols, human-computer interaction in security and, in general… | topic security, security cryptography, interaction security, security general, overall security | research, authentication, ceo, currently, secure | 1 |
jessiegeorges.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | artist, powder, house, paper, series | 1 |
jetimport.be | As long as the retention of title exists, the goods may not be given as security or pledged. The customer must notify us immediately if the goods are seized by the courts. | good security, security customer | flavour, premium, taste, available, tea | 1 |
jimex.be | …cadlockseal… Cadlock seal… Snap… Collars & cable ties… Stainless steel cable ties… Identification… | security envelope, high security | blue, red, green, black, yellow | 0 |
joachim-gielen.be | Our aim is to bring IT-students from different countries and partners together for a project week around the topic of Defensive and Offensive web security. This event will be organised by the Network and System Administration group at the University of Skövde. | cyber security, security professional, security project, professional security, security adit | goal, progress, technical, analysis, passionate | 4 |
jobswap.be | We use cookies to enhance your experience and your security on our website and app. We also accessing your personal browsing data for web traffic, analytical and marketing purposes. By visiting our website you consent with our Cookies Policy. You can discover more about our cookies policy by… | experience security, security website | swap, employee, investor, community, user | 1 |
jonasclaes.be | Explore Cloudflare Tunnels and Access for securely publishing internal apps. Enhance web infrastructure security, performance, and user experience while maintaining granular access control over your resources. | infrastructure security, security performance | tutorial, engineering, cloudflare, feature, pragmatic | 3 |
jonaslibbrecht.be | From the network layer to fully managed infra, OS patching, security implementations / auditing, KVM tuning, (forensic) logging, ... | cyber security, security specialist, patch security, security implementation | cloud, linux, consultancy, provider, complexity | 3 |
jorgengenar.be | Our experienced electricians are highly trained in all aspects of electrical service, from office lighting and security systems to emergency repair. | lighting security, security system | meer, electrical, annual, order, effective | 1 |
jorissen-law.be | Lawyer in Brussels, Belgium specialised in commercial & contract law, construction & real estate, transport & traffic law, labour & social security law | social security, security law | law, lawyer, real, estate, labour | 4 |
joshuadhondt.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | corporate, necessary, meer, photography, absolutely | 1 |
josvanroie.be | In debt knowledge of most European countries social security, labour law and payroll systems; | social security, security labour, security regulation, security coordination | labour, country, member, european, germany | 4 |
jrnconsulting.be | Feel free to roam about a bit, find out what JRN can do for you, what his track record is and how to reach him. | blog security, security tidbits | consulting, cybersecurity, passionate, necessary, track | 0 |
jsconf.be | We'll publish the recordings in the early of 2021 when we'll announce our next edition. Make sure to attend our conference if you want to enjoy our quality content right away. | js, conference, sponsorship, opportunity, javascript | 0 | |
jsltechnology.be | …medium and small sized, monitoring and approval of new customers and support users and servers VMWare – ESXI, vSphere, vCenter and Converter (Installation, configuration and maintenance) and Xen Virtualization, installation and Configuration of Security System ( CCTV , Access Control, PABX etc). | security info, configuration security, security system | technology, network, server, silva, developer | 2 |
judithclijsters.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | admin, dance, anytime, movement, artistic | 1 |
julienfontaine.be | With more and more devices connected to the internet, security and management is definitely a major concern. Once the servers become overloaded and represent a single point of failure... read more... | internet security, security management | electronic, thing, iot, fully, gateway | 1 |
jump2grow.be | Both in the profit sector (focus on manufacturing & security sector ) and non-profit (healthcare & education ). | automotive security, security emergency, manufacture security, security sector | healthcare, jump, employee, education, industry | 3 |
june21.be | Shop the most beautiful jewelry, clothing and accessoires accessible at a fair price for all women at June 21. | security privacy | june, jewelry, fashion, diamond, giftcard | 0 |
junipernetworks.be | We help IT teams to innovate and deliver higher ROI. As an Elite Partner to Juniper Networks we solve your most complex network and security challenges. | network security, security challenge, solution security, security network | network, juniper, case, elite, read | 3 |
jvm.be | 6.2. You may not probe, scan or test the vulnerability of the site or any network connected to it, nor breach the security or authentication measures on the site or any network connected to it. You may not reverse look-up, trace or seek to trace any information on any other user of or visitor to… | network security, security authentication | jvm, law, intellectual, property, firm | 2 |
k-force.be | K-Force, located in the south of Brussels, is for over 20 years a trusted partner for cloud, IT & telephony solutions for SME's. | cloud security, security expert | telephony, workplace, cloud, sme, responsible | 0 |
kalix.be | Our IT solutions carve the path for organizations to modernize infrastructure and optimize workflow like never before. This service provides a wide variety of technological capabilities to boost efficiencies, enhance security and allow infinite scalability for future growth. With this resource and… | efficiency security, security infinite | counsellor, cloud, backup, organization, microsoft | 1 |
kalypsico.be | Security exists to protect your business whether you operate in a cloud, on-premise or hybrid environment. Security as a Service is a new mindset that delivers effective, efficient security with the value and scale you need, when you need it, so you can stay focused on your core business. | environment security, security service, efficient security, security value | cloud, consulting, strategy, implementation, technology | 2 |
kappadata.be | Our attractive product portfolio is backed up by our strong technical and commercial expertise and support. Whether it concerns networking, security or IoT, Kappa Data always has a contact person on hand for all your technical questions. | network security, security iot, infrastructure security, endpoint security, cloud security | kappa, network, iot, value, request | 52 |
kartingdesfagnes.be | Since 1987, our team has done everything possible to help you experience the sensations the most intense while ensuring your security . | rental, private, schedule, track, discover | 2 | |
kazakhstanembassy.be | This page addresses the security and safety aspects that can be of a real concern for Kazakh tourists who choose to visit Belgium as part of their vacation or travel. Since people’s safety is of utmost importance, all tourists who venture out | page security, security safety | tourist, embassy, kazakhstan, castle, history | 1 |
kbc.be | Go for our KBC Basic Account with its many standard services or opt instead for the extra convenience of our KBC Plus Account. | security deposit | insurance, loan, banking, saving, private | 0 |
kbrv.be | In 2020, merchant shipping, towage and hydraulic engineering had a combined direct turnover of € 6.9 billion. The total (direct + indirect) value-added of the shipping sector had increased by 26% since 2016. Although total value-added still stood at 2.5 billion in 2016, this figure rose to 3.1… | shipping, maritime, library, priority, cluster | 0 | |
kecotabs.be | NEW - with Locking Top for Security! KECO's L2E is the most comprehensive glue pull repair system available to body shop technicians. This system ... | new security, security keco | tab, glue, system, repair, cart | 1 |
keyboardwarrior.be | We design and implement software with the best security practices in mind. Our testing processes will verify that it operates securely by subjecting it to wide range of adversarial attacks. | good security, security practice, hacker security, security access, security training | warrior, keyboard, native, language, build | 13 |
keysec360.be | We scan up to 20 external public IP addresses every month to discover new vulnerabilities, open ports and security issues. Issues will be reviewed and reported monthly. | manage security, security services, shoot security, security assessment, security operation | vulnerability, package, continuous, endpoint, firewall | 18 |
keyseradvocaten.be | …and fiscal repercussions for both spouses. This is why it is of crucial importance that both parties have a clear understanding of the consequences of a divorce before embarking on the proceedings. We defend the rights of our clients to financial and family security in the wake of a divorce. | family security, security wake | inheritance, law, legal, mediation, lawyer | 1 |
keystone-solutions.be | Elevate your online presence with Keystone Solutions. Our expert team specializes in software development, hyperautomation, security and IT consultancy. Partner with us for tailored strategies and innovative solutions to drive your business forward. Contact us now! | hyperautomation security, security consultancy, consultancy security, security precision, progress security | keystone, technology, consultancy, career, innovative | 7 |
keytech.be | KeyTech delivers IT support, cloud solutions, web services and digital marketing to small and medium-sized enterprises in Belgium. | support security | cloud, manage, innovation, human, admin | 0 |
kiefer-beernaert.be | Helping projects to increase their quality by applying software test automation. Using performance testing to look for bottlenecks to help optimize software products. Making security assessments of software applications to solve security flaws. | product security, security assessment, application security, security flaw, influxdb security | testing, automation, resume, apply, consultant | 5 |
kieranclaessens.be | Apple is notorious for it's security so as a starting bug bounty hunter they seemed like a nice target to test where I'm at with the skillset that I have aquired over the past couple of months. They have dozens of websites and allow us, bug bounty hunters, to test their web security but they don't… | cyber security, security challenge, notorious security, security start, web security | story, authentication, fame, bounty, bug | 2 |
kiloton.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, advertising, storyboard, activation, meer | 1 |
kine-for-you.be | We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings. | domain security, security reason, browser security, security setting | setting, domain, able, external, map | 1 |
kingof.be | …solar storm strikes the earth causing communications to collapse and airspace to shut down. No phones. No planes. To make matters worse, Turkish security coldly dismisses the King’s suggestion they return home by road. But the King has no intention of waiting out this storm. Lloyd, sniffing an… | turkish security, security coldly, security loyal | king, director, f, producer, official | 2 |
kingsofweb.be | There are many variations of passages of Lorem Ipsum available but the majority have suffered alteration. | website security | king, mohammed, ipsum, purchase, admin | 0 |
kioz.be | “Thanks to Kioz , not only is my business more self-sufficient in terms of energy, but it's also more forward-thinking . Now, not only does the sun shine on my crops, but also on my energy bill.” | energy security | energy, independence, supply, space, future | 0 |
kitetrek.be | Thanks to this amazing school and teachers, I am learning the kitesurf with a great security, and I see clearly my improvement thanks to their high quality teaching method and process. Feeling confortable and supported was important for me and they did it! Now, I would like to keep learning like I… | great security, security clearly | spot, course, wave, current, strong | 1 |
kizombalovefunctionaltherapy.be | …can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. | security log, legal security, security purpose | therapy, functional, health, medicine, care | 3 |
kjoo.be | I was invited by Michael Schenkel of t2Informatik to be guest author for the companies blog and offered to write about any favorite topic. And what could come closer being one of my hot topics than the intersection of business analysis and security? Maybe business analysis and quantum computers… | blockchain security, security quantum, cyber security, security business, cryptography security | quantum, blockchain, analysis, cryptography, engineering | 15 |
klareco.be | "Klareco works in a particularly customer-oriented way. Questions are asked and, at Klareco, the customer's needs are understood very quickly. Inspiring, intelligent solutions that really make a difference. As a result, things are dealt with quickly, transparently and smoothly, which isn't always… | logistic security, security operation | energy, cost, environmental, regulation, challenge | 0 |
kmspartners.be | …energy transmission projects and regulations. His practice also encompasses counselling and litigation in the areas of capital markets and securities regulation. Jean-Pierre is also in charge of the firm’s relations with ADVOC, a leading international network of independent law firms. He is… | market security, security regulation | law, lawyer, member, corporate, area | 2 |
knstnlab.be | Sign up for our newsletter and be the first to discover what's happening in the city of Antwerp! | antwerp, city, user | 0 | |
kom-cleaning.be | Kom-Cleaning is specialised in the cleaning of glass surfaces and windows at height. We use professional and adapted equipment for all types of windows, even those that are difficult to access. | clean, window, panel, area, solar | 0 | |
kontinenten.be | …after the first grade of secondary), the CAP attest (Certificat d’aptitude professionelle) as the former A2 diploma, and the BEP certificate A1. The cooperation between our association and CFP promotes access to vocational training and future job security for many young people in Senegal. | job security, security young | child, education, access, certificate, birth | 1 |
koobilo.be | Whether riding in the backseat or driving up front, every part of the Koobiloexperience is designed around your safety and security. | ride, sign, driver, city, safety | 1 | |
kristoftiteca.be | Titeca, Kristof (2016) “ Haut-Uele: Justice and Security Mechanisms in Times of Conflict and Isolation ” Justice and Security Research Program Paper 32, London: London School of Economics and Political Sciences. | regime security, security shorttermism, justice security, security mechanism, security research | titeca, uganda, research, political, african | 2 |
krum.be | Flab gives a certain sense of security to the workplace through its shape, without disrupting the openness of the space too thoroughly. Worktop in linoleum, a natural material with soft tactility, is extremely pleasant as a work tablet. | sense security, security workplace | view, poly, chair, furniture, material | 1 |
kulmun.be | KULMUN conducts a diverse range of trainings , including, public speaking training, plenty of mock debates, negotiation trainings, seminars and of course mini MUNs. Last year for example, we were given a seminar by the head of Belgium's delegation to the United Nations Security Council Werner… | nations security, security council | conference, united, board, membership, delegate | 1 |
kvmglobal.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | kvm, extender, system, matrix, global | 1 |
kyravandeneynde.be | Welcome to my first blog! My name is Kyra Van Den Eynde and I am a Cyber Security student at Howest Brugge. This blog is a school project, but might be used afterwards as well. In this blog I will | cyber security, security student | session, network, march, tutorial, secure | 1 |
kyrevi.be | Home… Cookies… Privacy… Disclaimer… | quality security, security compliance | activity, ltd, happy, program, strategy | 0 |
kzino.be | Kzino have been already since 2009 active and for a lot of event companies a fixed value in the sector. Are you in search to a reliable partner, who class-full can appreciation offer to your casino event? Leave gambling to the guests and play on security with Kzino! | guest security, security kzino | stylish, game, nl, class, search | 1 |
laadplan.be | Organisations are increasingly ensuring that their employees' expertise is kept up to the mark by offering e-learning modules, which are often studied partly or wholly in the employee's own time. It can often be difficult to accurately establish the current level of expertise within an… | scheme, behaviour, saving, fuel, battle | 0 | |
lab360.be | Createl is a company dedicated on hold messages and music. Also provide wide range of products such doorphones and cameras in the security field. | camera security, security field | lab, european, industry, campaign, technology | 1 |
laborimpex.be | Laborimpex is specialized in distribution of kits, reagents, equipment and laboratory consumables. We are a team of experts with extensive experience in cellular and molecular biology, biotechnology, microbiology, genetics and electron microscopy. | hygiene security | kit, pcr, rack, series, rna | 0 |
ladiescircle.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | circle, necessary, lady, pin, travel | 1 |
lamaisonducouscous.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, venue, wine, reservation, absolutely | 1 |
lambertmercedes.be | Unimog Security / Defence Vans Services Mercedes garage specialising in commercial vehicles: heavy goods vehicles and light commercial | unimog security, security defence | vehicle, mercedes, light, heavy, sale | 6 |
larscroes.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, absolutely, basic, feature, functionality | 1 |
lasystems.be | Online Shopping at LASystems for the best B2B deals in electronics, computer and household products for business clients, institutions and diplomats. | network, vat, system, discover, arrival | 0 | |
lcl.be | LCL becomes first Belgian data center to receive gold medal for sustainability from EcoVadis | pci security, security standard | lcl, center, reference, reliable, available | 0 |
leaderssl.be | Sectigo (Comodo) offers 2, 3, 4 and 5-year Subscription SSL bundles allowing you to obtain continuous certificate coverage for up to five years while saving you money. According to rules of CA/B forum and for security reasons, your certificate will initially be issued with a maximum validity… | website security, security solutions, forum security, security reason, google security | ssl, certificate, domain, trial, sign | 16 |
lealis.be | Lealis: Independent expertise in Employee Benefits for International Organisations - Social Security - Health Insurance - Expats | social security, security health | employee, benefit, trade, insurance, finance | 6 |
learnia.be | Microsoft Access… Microsoft Excel… Microsoft OneNote… Microsoft Outlook… Microsoft PowerPoint… | digital security | microsoft, adobe, power, access, dynamic | 0 |
lectureforeveryone.be | LFEO is a project by Sarah Vanhee, produced by CAMPO - Copyright © 2013 Lecture For Every One - Powered by WordPress and Hatch | eitner security | academy, university, berlin, cinema, santa | 0 |
ledabel.be | Our LED screens are top quality and offer fascinating visual possibilities. Whether you are looking for indoor LED screens, outdoor LED screens, LED posters, logo LED screens or LED screens used as shop signs, Ledabel has it all. | legal, lead, display, panel, pixel | 0 | |
ledcon.be | Streetlight (or street lighting) can be found along the way and other places in public spaces such as parks. In the dark, it is important that road users can estimate traffic hazard. Plenty of time Moreover, good street lighting increases the sense of social security. | lighting, light, industrial, discover, lead | 1 | |
legalfinder.be | Your case is submitted to all the lawyers in the relevant legal field and you will be notified by email every time a lawyer is interested, in order to validate the one you want. In general, you will be able to find a lawyer in less than 1 hour , if you choose to validate one of the first lawyers… | social security, security health, banking security, security law | law, lawyer, legal, finder, search | 0 |
legendremovals.be | Our company works according to the principle of individual approach to every client . This method lets us to get success in problems of all levels. Once the details of the move are confirmed and the moving package is selected we would require the formal acceptance and small security deposit paid… | small security, security deposit | legend, removal, owner, quote, house | 1 |
legile.be | In the realm of legal tech innovation, Vincent Schoeters, recognized the need for digitalization to enhance his own practice and elevate his clients’ experiences . He embarked on a journey to adopt legal and compliance technology (such as privacy and contract management platforms) and seamlessly… | privacy security, security service | legal, compliance, esg, innovation, tech | 0 |
lemariagedelouise.be | Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to… | ensure security, security fraud | launch, duration, storage, view, device | 0 |
lemonlive.be | At Lemon Live, we are all about advising on and delivering a hosting, - or cloud solution tailored to your needs. We offer only highly scalable solutions that can grow with your business. Never pay for resources you don't use. | cloud, approach, consultancy, private, lemon | 0 | |
leonidas-kortrijk.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | tea, necessary, graphic, absolutely, basic | 1 |
lerat.be | LERAT is specialized in lead products and in security seals: lead seals, plastic seals, sealing wire and sealing pliers. We also provide perforating punching pliers. | product security, security seal | lead, seal, wire, nl, material | 6 |
lerman.be | . During my PhD thesis, I was a teaching assistant and a student doing research as part of a Machine Learning Group (MLG) and the Cryptography and Security Service (QualSec). The supervisors of my thesis were Professor Gianluca Bontempi and Professor Olivier Markowitch . During the first year of my… | cryptography security, security service, belgium security, security engineer, swift security | research, teach, lab, learn, cryptography | 3 |
leroyv.be | Protect your organization's digital assets with a cybersecurity consultant specializing in offensive security. Contact me for tailored solutions. | offensive security, security solution | consultant, cybersecurity, asset, offensive, organization | 4 |
lesplumes.be | The Slootjenshoeve radiates cosiness, warmth and security – confidentiality. Its rural location, surrounded by water, brings tranquillity. The ballroom, the authentic barn and the cosy courtyard provide space for realising creative ideas. Even overnight with family, friends or business teams after… | warmth security, security confidentiality | venue, discover, story, manifesto, private | 1 |
letzbookit.be | Secure payment: Data security is our top priority. While paying by credit card, your payment data will always be protected. | datum security, security priority | flight, trip, airline, today, cheap | 1 |
leuvenconventionbureau.be | Leuven Convention Bureau helps you to discover Leuven , an exceptional hotspot for conferences | food security, security conference | conference, discover, exceptional, view, reason | 0 |
levaco.be | Since 2012 Levaco is a fully certified, recognized and international “Authorized Economic Operator” enhancing the supply chain security and facilitating legitimate trade in the European Economic Community. | chain security, security legitimate | logistic, today, global, value, cargo | 1 |
levit.be | Django is said to be “The web framework for perfectionists with deadlines” . It is currently the leading open-source python web framework. It also has a large community and a strong focus on security. | word security, security reliability, major security, security vulnerability | framework, django, legal, notice, responsive | 5 |
lexgo.be | Whether you are a lawyer at the Bar, in-house legal counsel , corporate attorney, tax specialist , paralegal , compliance officer , notary , bailiff or other legal professional, LexGO is the information portal and job board covering all aspects of the law in Belgium and the life within the Belgian… | lawyer, house, law, notary, legal | 0 | |
lichtlijn.be | We've been using your company and from the very beginning found him and his team to be extremely professional and knowledgeable . We wouldn't have any hesitation in recommending their services. | security system | electrical, annual, system, order, panel | 0 |
liftmi.be | My name is Micha De Mets, and I'm currently working at Leonardo Belgium as the QHSSE Manager (Quality Health Safety Security Environment). | safety security, security environment | aviation, safety, organization, auditor, camo | 1 |
lilliputiens.be | We accept payments by credit card (Carte Bleue, Visa, or Mastercard) and Bancontact through the secure Payplug system, which ensures the security of the transaction according to the latest standards via the secure PCI DSS platform of Payplug. We also accept payments through PayPal. | system security, security transaction | review, wishlist, add, toy, activity | 1 |
lim-it.be | The focus of Lim-IT is to bring our passion for ICT to our customers, along with our goal of delivering high quality Security & Network solutions. | degree security, security network, quality security, core security, network security | lim, network, micro, offer, secure | 6 |
link2trust.be | Exciting times lie ahead in the realm of cybersecurity! Today, we want to delve into the concept of crypto-agility and how it can empower organizations to fortify their security strategies against evolving threats. What is Crypto-Agility? Crypto-agility refers to an organization’s ability to… | enterprise security, security architecture, security application, security awareness, cyber security | ahead, governance, cryptography, road, pki | 11 |
linux-training.be | Linux Fundamentals System Administration Linux Servers Linux Storage Linux Security Linux Networking | linux security, security linux | linux, fundamental, system, old, storage | 1 |
liulin.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | liu, reservation, necessary, lifestyle, meal | 1 |
live-shop.be | As a processor of personal data, LIVE shall, to the extent possible, implement technical and organisational measures that it considers reasonable and appropriate to the nature of the processing of personal data that it carries out in accordance with this Addendum, in particular with regard to… | ownership security, security privilege, regard security, security confidentiality | shall, order, technical, processing, particular | 3 |
livekaarten.be | Copyright © 2023 LIVEKAARTEN. All Rights Reserved. Pay Shield Ltd. Unit 5a, Westwood Industrial Estate, Continental Approach, Margate, Kent, England CT9 4JG | internet security, security software | card, game, gift, xbox, playstation | 0 |
llamouline.be | I was born on May 6, 1987 in Libramont. I am a civil engineer from the Université Catholique de Louvain in Louvain-La-Neuve (Belgium) where I followed a full english master in Networking and Security. My master thesis consisted in designing a geo-localization system based on an ad-hoc wireless… | network security, security master | author, category, system, file, paper | 2 |
lmbd.be | Fabrice Mourlon Beernaert’s main areas of practice include corporate and securities law, energy law, bankruptcy law, as well as mergers and acquisitions and life science related matters. | corporate security, security law | law, litigation, supreme, corporate, firm | 1 |
locationsroussillon.be | The station earned the label « Station Kid » which offers a center, security, organized activities and adapted equipments for children from 3 to 16 years old. | center security, security activity | beach, reservation, mediterranean, sandy, spain | 1 |
locksnlips.be | Cantu's hair care products are suitable for all hair types, including curly, wavy, or straight hair. Special products for curly hair comply with the Curly Girl method. Whether colored, damaged, curly, or children's hair, Cantu has products for the whole family. | hair, color, accessory, price, sale | 0 | |
lodyssee.be | DISCOVER HOW OUR IGI, HRD, GIA, GRS, SSEF OR GUBELIN CERTIFIED DIAMONDS ARE BEING SORTED AND THEN SEALED WITH NO-DUPLICATABLE SECURITY ITEM. | duplicatable security, security item | diamond, gemstone, certify, gem, stone | 1 |
loftboat-location-peniche-bruxelles.be | Rent the barge for your professional or private events: Cocktails, conferences, press conferences, product launches, exhibitions, information day, receptions, birthdays, weddings, rallies, seminars, shows, filming… | boat, private, barge, previous, rental | 0 | |
lousec.be | Cyber threats are always evolving. In the past couple of months, there has been a large increase in phishing messages sent using Microsoft Teams. Louis and Thijs work in a Security Operations Center and handle these types of attacks daily. During this session we will cover the following: – Some… | lousec security, security simply, work security, security operation, detect security | microsoft, defender, endpoint, auditing, custom | 8 |
lprservices.be | Services… Wedding Planning… Wedding Coordination… Hostesses and Security… Wedding Destination… Wedding… | hostess security | wedding, hostess, visual, creative, appointment | 0 |
lsdevign.be | Our collaboration with the recognized hosting supplier Combell also guarantees the capacity, security, accessibility and support that our projects and our customers need. In addition, we take all necessary measures ourselves to keep your website up-to-date, online and secure. | capacity security, security accessibility | woocommerce, plugin, custom, quote, host | 2 |
lsealumni.be | On 13 July, the LSE AAB invites you to a discussion with H.E. Ambassador Mikael Lindvall, Sweden’s representative to the EU’s Political and Security Committee, on Sweden’s Presidency of the Council of the EU. The discussion will be followed by an informal networking drink nearby. | political security, security committee | lse, alumnus, board, vacancy, member | 1 |
lucidus.be | Take full advantage of the cloud by auditing your current IT infrastructure . We focus on best practices, security, cost optimization and evaluate your applications innovative power. In addition we support you with the governance and administration of your cloud environment. | practice security, security cost | cloud, automation, multi, infrastructure, story | 1 |
lunetantwerp.be | The lunette of Herentals (Antwerpse Lunet) was part of the Spanish defensive city wall. It was built as security for the city of Antwerp and the Herentals Canal (Herentalse vaart), the main water supply. The lunet of Herentals had a wet moad and four protective barriers. These barriers shaped a… | wall security, security city | antwerp, away, picture, city, upcoming | 1 |
lwb-info.be | LWB takes the payroll process off your hands, quickly and accurately. With the right vision and a thorough knowledge of the business community, LWB applies social security legislation in an orderly and budget-friendly way. We do this for sole traders, start-ups, and SMEs. | social security, security audit, security legal, security advice, security legislation | trader, sole, sme, area, legal | 7 |
lycamobile.be | …(e.g. IP address and session details) and browsing activity. We use this information for various purposes - e.g. to deliver content, maintain security, enable user choice, improve our sites, and for marketing purposes. You can reject all non-essential processing by choosing to accept only… | content security, security user | deal, cheap, low, bundle, cost | 3 |
m-c-b.be | DEMOCRACY FOR EVERYONE was already a major improvement for our society… but, since the last century, this form of democracy is limited at short terms… | movement, democracy, click, evolution, future | 0 | |
madshrimps.be | Apple made a rare public commitment on Monday, announcing a significant change in its security update policy. This change, which follows the UK's new Product Security and Telecommunications Infrastructure (PSTI) regulations, ensures a minimum of five years of security updates… Go To Full Article | change security, security update, product security, security telecommunication, year security | review, keyboard, case, amd, intel | 2 |
maecenas.be | In 2003, Bram founded iGlobe, specializing in ICT-consultancy. His advise on development operations, testing and security, supported Nascom (founded by Jonas) on multiple occasions. Sharing values both on private and a professional level, Bram and Jonas co-founded Maecenas Group. | testing security, security nascom | maecenas, venture, strong, idea, bright | 1 |
magicbeans.be | Magic Beans helps customers setting the cloud journey strategy, planning and implementation with the change management programs needed to support the business transformation. Architecting the most flexible solutions to be able to easily adjust to new business needs. Implementing Security at all… | security assessment, azure security, need security, security level | bean, magic, azure, cloud, aw | 5 |
magicu.be | A cool clock. This app provides the Metro style of clock, Its amazing visuals can keep you entertained, and will keep people staring at your phone. ★★★★★ Featured by Windows Phone Store in the New & Noteworthy Section #4 Windows Phone Overall Top Free on UK #8 Windows Phone Overall Top Free ... | game, window, phone, friend, music | 0 | |
magisautomobiles.be | Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. | functionality security, security feature | necessary, twitter, pinterest, hello, edit | 1 |
magliamo.be | Error validating access token: The session has been invalidated because the user changed their password or Facebook has changed the session for security reasons. | session security, security reason | quick, view, cycling, wool, merino | 1 |