SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
SUPERIOR SECURITY
FOR BUSINESS
WORKSTATIONS
© F-Secure Confidential2





EDWARD
SNOWDEN AT
CEBIT:
“WE HAVE TO
IMPROVE THE
SECURITY OF OUR
END-POINTS.”
* Source: Ponemon
© F-Secure Confidential3



Endpoint protection is a core element of cyber security
Don’t compromise
Only accept the best
security for your
company
© F-Secure Confidential4




© F-Secure Confidential5
* With Client Security Premium
© F-Secure Confidential6
ADDED VALUE WITH
CLIENT SECURITY
PREMIUM
© F-Secure Confidential7
© F-Secure Confidential8
WEBCONTENTCONTROL
CONNECTIONCONTROL
SOFTWAREUPDATER
WEBCONTENTCONTROL
© F-Secure Confidential9
Prevent malicious content from entering your network
1. Reduce productivity losses, bandwidth consumption,
and legal risks caused by unauthorized employee
access to inappropriate or distracting web content
2. Improve security by providing an extra layer of
protection
© F-Secure Confidential10 Source: http://www.salary.com/2014-wasting-time-at-work/
2013 of all respondents said they waste at
least some time at work on a daily basis.
69%
The number of people in 2014 survey
who reported wasting time at work
every day is up to a whopping 89%
89%
OF PEOPLE SURVEYED WASTE AT LEAST
HALF THE AVERAGE WORKDAY ON
NON WORK-RELATED TASKS.
4%
A 20% INCREASE
COMPARED TO
LAST YEAR
IMPROVEDPRODUCTIVITY
THROUGHCONTROLLEDACCESS
© F-Secure Confidential11
WHERE’S THEWASTE?
Source: http://www.salary.com/2014-wasting-time-at-work/
GOOGLE FACEBOOK LINKEDIN24% 15% 14%
31% waste roughly 30 minutes daily
31% waste roughly 1 hour daily
16% waste roughly 2 hours daily
6% waste roughly 3 hours daily
2% waste roughly 4 hours daily
2% waste 5 or more hours
89%
IMPROVESECURITY



© F-Secure Confidential12
CONNECTIONCONTROL
© F-Secure Confidential13
• Improve security through controlled and safe access
to business critical assets
• Allows connections during the session to sites which
are verified safe by F-Secure
• Protects the weakest link in business critical sessions –
the web browser
© F-Secure Confidential14
WHYASECURECONNECTION
MATTERS?
 Financial loss when online banking credentials
and money from the bank account is stolen.
 Business secrets stolen if cloud-based CRM
credentials are stolen
© F-Secure Confidential15
SUPERIOR SECURITY
 Activates automatically in the browser when
entering a web site
 Prevents unknown banking Trojans from
sending sensitive information to online
criminals
 Closes network connections to unknown sites
and prevents new ones during session
x
© F-Secure Confidential16
STOPTHEATTACKSBEFORE
THEYENTER
The weakest links:
The online bank users and their browsers
Banks have secured the connection from browser
to the bank and the online banking servers
Phishing Trojans
© F-Secure Confidential17
SOFTWARE UPDATER
…
This provides added value
through increased protection
(Finding an update + Downloading + Applying)
* Number of apps * Number of PCs * € per hour
Deploying SWUP
* € per hour
Cost savings through
operational efficiency
Automatically patch
your software
18
OUT-OF-DATESOFTWAREISA
SIGNIFICANTSECURITYRISK
85%
85% of TOP10 malware
could have been avoided
with up-to-date software
87% of corporate computers
miss critical updates
AND YET
87%
© F-Secure Confidential
© F-Secure Confidential19
ISWINDOWSBASEDPATCH
MANAGEMENTENOUGH?
85%
12%
3%
Are in 3rd party
software
In operating
system
Miscellaneous
© F-Secure Confidential20
MOSTCOMMONLY
MISSINGUPDATES
© F-Secure Confidential21
REALITYOFSOFTWAREUPDATES
What has been
installed?
Updates
needed?
Security
related?
Find right
ones?
Download
& install
All applications
All computers Not
enough
time!?
© F-Secure Confidential22
SOFTWAREUPDATERISUNIQUE
Best detection,
automatic updates
and integrated
management for an
affordable package
price
Unique patch
management
not just for
Windows but
also for 3rd party
products
Automatic
deployment
of security
updates
© F-Secure Confidential23
 Best protection
against all threats
 Control
 Software Updater
(= patch management)
 Proactive protection
against threats
NEW KEY SECURITY
ELEMENTS IN CLIENT
SECURITY
© F-Secure Confidential24
© F-Secure Confidential25
ADVANCEDPROTECTION
BOTNETBLOCKER
ADVANCEDPROTECTION
© F-Secure Confidential26


© F-Secure Confidential27
STOPMOSTOFTHEWEBATTACKS
JAVA
28%
FLASH
33%
WINDOWS
10%
SILVERLIGHT
5%
Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html
Block 100% of Java applets and Windows malware
that come from unknown sources you do not trust.
Technologies
targeted by
exploit kits
in 2014-2015




© F-Secure Confidential28
BOTNETBLOCKER
© F-Secure Confidential29



CLIENT SECURITY
FEATURES
© F-Secure Confidential30







© F-Secure Confidential31
ClientSecurityofferspioneeringsecurityfor
allWindowsworkstations,whetherdesktops
orlaptops.Itsnumerousprotectionlayers,
pioneeringtechnologiesandvalue-added
functionalitiesensureunprecedented
protectionforbusiness.
© F-Secure Confidential32
• Key component of security, prevents up-
to 85% of all malware in existence
• Automatically updates over 3800
different 3rd party software and versions
• Creates vulnerability analysis of your
environment
© F-Secure Confidential33
• Key in constantly reaching protection
levels over the industry average
• Unmatched protection against advanced
0-Day threats
• Sophisticated technology, with heuristic,
behavior and reputation analysis
• Monitors the most commonly exploited
software
© F-Secure Confidential34
…
• Protects you by preventing access to
malicious sites
• 28 different web content categories
available
• Enforce web content control policies
centrally from Policy Manager
© F-Secure Confidential35
• Protects you against harmful activity
when accessing online banking and other
business critical sites
• Supports all the major browsers
• Closes network connections to unknown
sites while enabled in Policy Manager
© F-Secure Confidential36
• Web Traffic Scanning Advanced
Protection allows the administrator to
block selected content from unknown or
suspicious sites
• Protects the user from typically
vulnerable content from websites
• The admin can whitelist selected sites
© F-Secure Confidential37
• Administrator can prevent network
activity relating to known botnets
• Blocks Domain Name Server (DNS)
queries on the host level
• Admin can filter out queries based on
domain reputation with option for
whitelist
© F-Secure Confidential38
• Global protection in 60 seconds from
initial detection
• Unmatched protection against new
emerging malware
• Global coverage drastically reduces the
window of exposure
© F-Secure Confidential39
• Highly-advanced anti-malware platform,
using multi-engine detection capabilities
• Offers vastly better security coverage
without being reliant on single
technology
• Provides unmatched protection against
viruses, trojans, rootkits and other
malware
© F-Secure Confidential40
• Ensures that employees can work safely
and efficiently online without worries
• Proactively prevents employees from
accessing harmful sites, links or contents
• Removes human error and proactively
minimizes exposure
• Works with all major browsers
© F-Secure Confidential41
• Gives an extra layer of protection against
malicious network activities
• Manage firewall rules and profiles
remotely, and assign them based on
device type
• Works dynamically with DeepGuard and
Application Control
© F-Secure Confidential42
• Better manageability for USB devices
• Prevents malware infections via USB
• Administrator can be notified if device
has been blocked
© F-Secure Confidential43
© F-Secure Confidential44
GET SERIOUS ABOUT
ENDPOINT
PROTECTION

Mais conteúdo relacionado

Mais procurados

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 

Mais procurados (20)

Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral Movement
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 

Destaque

Network proposal
Network proposalNetwork proposal
Network proposal
Waldo Botha
 
Network Design
Network DesignNetwork Design
Network Design
cornimar
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
wolfthrone
 

Destaque (12)

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Network proposal
Network proposalNetwork proposal
Network proposal
 
Network Design
Network DesignNetwork Design
Network Design
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Semelhante a Client Security - Best security for business workstations

Seculert presentation
Seculert presentationSeculert presentation
Seculert presentation
themarker
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 

Semelhante a Client Security - Best security for business workstations (20)

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source Software
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Seculert presentation
Seculert presentationSeculert presentation
Seculert presentation
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 

Mais de F-Secure Corporation

Mais de F-Secure Corporation (17)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
F-Secure's Annual Report 2012
F-Secure's Annual Report 2012 F-Secure's Annual Report 2012
F-Secure's Annual Report 2012
 
F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012F-Secure Labs Mobile Threat Report Q4 2012
F-Secure Labs Mobile Threat Report Q4 2012
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Client Security - Best security for business workstations