Search results
From GCA ACT
Jump to navigationJump to search
Page title matches
- ...wide range of products and services that help organizations protect their mobile devices from cyber threats. ...gainst advanced cyber attacks, malware, phishing scams, and other types of mobile-specific threats.707 bytes (99 words) - 05:02, 23 April 2024
- ...ting personal information and offers solutions to enhance privacy and data security. ...ping, banking, and browsing. It emphasizes the need for protection against mobile malware, which is a growing threat on Android devices. The resource mention2 KB (257 words) - 14:40, 25 October 2023
- ...ting personal information and offers solutions to enhance privacy and data security. ...ping, banking, and browsing. It emphasizes the need for protection against mobile malware, which is a growing threat on Android devices. The resource mention2 KB (257 words) - 18:59, 25 October 2023
- ...nd a phone locator that can help you find a lost or stolen device. Lookout Security & Antivirus is a free app, but it does include ads.588 bytes (97 words) - 06:51, 30 October 2023
- ...plication Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS), a comprehensive testing guide (OWASP MASTG) and a check https://owasp.org/www-project-mobile-app-security/417 bytes (51 words) - 03:00, 24 April 2024
- ...ecure their mobile apps. The project also educates developers about common security risks and how to avoid them. https://owasp.org/www-project-mobile-app-security/446 bytes (59 words) - 23:53, 25 October 2023
- ...nd wipe, which can help you if your device is lost or stolen. Avast Mobile Security is available for free, and there is also a premium version with additional https://www.avast.com/en-us/free-mobile-security#pc574 bytes (83 words) - 06:48, 30 October 2023
Page text matches
- ...wide range of products and services that help organizations protect their mobile devices from cyber threats. ...gainst advanced cyber attacks, malware, phishing scams, and other types of mobile-specific threats.707 bytes (99 words) - 05:02, 23 April 2024
- ...ecure their mobile apps. The project also educates developers about common security risks and how to avoid them. https://owasp.org/www-project-mobile-app-security/446 bytes (59 words) - 23:53, 25 October 2023
- ...le is an organization that focuses on providing security solutions for the mobile workforce. They are a subsidiary of Check Point, a multinational technology [[Category:Mobile Security]]459 bytes (64 words) - 02:59, 24 April 2024
- ...ty. The iWelcome Mobile Identity is compatible with all major browsers and mobile operating systems, and it offers a variety of features to users including t https://www.iwelcome.com/mobile-identity/653 bytes (93 words) - 09:44, 27 October 2023
- ...nd wipe, which can help you if your device is lost or stolen. Avast Mobile Security is available for free, and there is also a premium version with additional https://www.avast.com/en-us/free-mobile-security#pc574 bytes (83 words) - 06:48, 30 October 2023
- ...plication Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS), a comprehensive testing guide (OWASP MASTG) and a check https://owasp.org/www-project-mobile-app-security/417 bytes (51 words) - 03:00, 24 April 2024
- ...aining platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. https://owasp.org/www-project-security-shepherd/403 bytes (50 words) - 02:58, 24 April 2024
- ...ting personal information and offers solutions to enhance privacy and data security. ...ping, banking, and browsing. It emphasizes the need for protection against mobile malware, which is a growing threat on Android devices. The resource mention2 KB (257 words) - 18:59, 25 October 2023
- ...ting personal information and offers solutions to enhance privacy and data security. ...ping, banking, and browsing. It emphasizes the need for protection against mobile malware, which is a growing threat on Android devices. The resource mention2 KB (257 words) - 14:40, 25 October 2023
- ...sy to use, making it a good option for websites and apps that require high security.598 bytes (92 words) - 09:47, 27 October 2023
- This resource, titled Your smartphone and you: A handbook to modern mobile maintenance, aims to provide users with valuable insights and guidance on e ...nhance their understanding of these devices and ensure their longevity and security.2 KB (234 words) - 23:53, 25 October 2023
- ...Cisco. It is a comprehensive and integrated approach that combines network security and secure connectivity into a single, scalable platform. ...t towards cloud-based applications and the increasing number of remote and mobile workers, making it a perfect fit for today's modern digital workplace.547 bytes (78 words) - 02:56, 24 April 2024
- ...ting devices and accounts. The purpose of these tools is to strengthen the security measures in place and safeguard valuable assets such as email, personnel re ...to both users and criminals. By taking proactive steps to fortify virtual security, users can reduce the risk of unauthorized access and potential data breach2 KB (229 words) - 23:54, 25 October 2023
- ...des a list of resources that people can use to learn more about smartphone security. https://www.fcc.gov/smartphone-security653 bytes (99 words) - 14:40, 25 October 2023
- ...nd a phone locator that can help you find a lost or stolen device. Lookout Security & Antivirus is a free app, but it does include ads.588 bytes (97 words) - 06:51, 30 October 2023
- McAfee's Enterprise Security Manager (ESM) is an organization that provides cutting-edge cybersecurity s ...such as malware, ransomware, and data breaches, by providing comprehensive security solutions.629 bytes (88 words) - 03:01, 24 April 2024
- ...enterprises to keep their devices up-to-date with the latest software and security patches.585 bytes (81 words) - 14:40, 25 October 2023
- ...authentication (2FA) passwords. Two-factor authentication is an additional security measure that requires users to provide two pieces of information to access ...ate unique verification codes for their accounts, adding an extra layer of security beyond simple passwords.2 KB (238 words) - 23:53, 25 October 2023
- ...ication tool that adds an additional layer of security to your computer or mobile device. With Rohos Logon Key, you can log in using a physical key, such as366 bytes (58 words) - 02:56, 24 April 2024
- ...ve obtained a user's password. Duo Security also offers a variety of other security features, such as the ability to monitor and block suspicious activity, tha660 bytes (104 words) - 05:01, 23 April 2024
- ...protect organizations from various types of cyber attacks and ensures the security and availability of their applications and APIs. ...countries. This global presence allows the platform to secure both web and mobile applications816 bytes (109 words) - 05:02, 23 April 2024
- ...dquartered in Prague, Czech Republic that researches and develops computer security software, machine learning and artificial intelligence. [[Category:Mobile Device Management]]531 bytes (68 words) - 02:59, 24 April 2024
- Blumira Agent is a security software developed by the cybersecurity organization, Blumira, based in Blu ...and mobile devices, for any suspicious activity. It collects and analyzes security data in real-time, providing users with a comprehensive view of their endpo695 bytes (94 words) - 05:02, 23 April 2024
- ...for devices and users across the enterprise. It combines industry-leading security and networking technologies to deliver a robust, scalable, and easy-to-depl * Security posture assessment800 bytes (101 words) - 05:02, 23 April 2024
- ...internet access on specific devices. The app is available for both PC and mobile devices, allowing users to take their WiFi protection to the next level. ...quick overview of all devices connected to a network, accessible from any mobile device. This allows users to easily identify and monitor the devices access2 KB (256 words) - 14:40, 25 October 2023
- ...al provider of software and combined hardware and software products for IT security. With over 25 years of experience, Check Point is recognized as a leader in733 bytes (99 words) - 03:00, 24 April 2024
- ...k access to malicious websites and enhance web browsing privacy on Android mobile devices. Quad9 Connect has been made available on the Google Play Store for ...ceeds 2.5 billion. By leveraging Quad9 Connect, users can benefit from the security features offered by the Quad9 DNS service, which actively blocks access to2 KB (282 words) - 23:54, 25 October 2023
- ...e and password, as well as a second factor, such as a one-time code from a mobile app or a hardware token.554 bytes (85 words) - 02:58, 24 April 2024
- ...can include a fingerprint scan, iris scan, or a one-time code sent to your mobile device. This makes it much more difficult for hackers to gain access to you588 bytes (85 words) - 09:45, 27 October 2023
- ..., a content filtering and security agent for district-owned devices, and a mobile app for student-owned devices. It also offers a wide range of customization https://www.lightspeedsystems.com/security-compliance/student-data-privacy/809 bytes (105 words) - 05:02, 23 April 2024
- ...video delivery experiences for their online platforms, including websites, mobile apps, and social media channels. The organization is based in Cloudflare, a leading internet security and performance company with a global presence.565 bytes (77 words) - 02:59, 24 April 2024
- ...stores and encrypts passwords for user accounts. LiveEnsure also offers a mobile app for iPhone and Android devices. The app provides a secure browser for s589 bytes (87 words) - 09:45, 27 October 2023
- ...ovide an additional form of authentication (such as a one-time code from a mobile app or an email address) in addition to your username and password when log633 bytes (95 words) - 09:46, 27 October 2023
- ...ity to your account by requiring a second factor, such as a code from your mobile device, in order to log in. This makes it much more difficult for someone t571 bytes (97 words) - 09:47, 27 October 2023
- ...d to secure access to on-premises resources, cloud-based applications, and mobile devices.560 bytes (80 words) - 02:56, 24 April 2024
- ...ulti-factor authentication, and track user activity. ActivID also offers a mobile app that allows users to access their credentials from their smartphones.688 bytes (93 words) - 09:45, 27 October 2023
- ...However, they will then be prompted to enter a code that is sent to their mobile phone via text message. This code must be entered in order to gain access t609 bytes (98 words) - 05:01, 23 April 2024
- ...ross various endpoints, including desktop computers, laptops, servers, and mobile devices. It uses a combination of real-time malware detection and preventio804 bytes (101 words) - 05:02, 23 April 2024
- ...egularly updating software and apps can fortify defenses against potential security vulnerabilities, which are particularly pronounced in situations of conflic ====Securing Mobile Devices and Networks====3 KB (446 words) - 05:35, 21 February 2024
- ...password or PIN), something the user possesses (e.g., a hardware token or mobile phone), or something inseparable from the user (e.g., fingerprints). ...ions on how to enable it. By enabling 2FA, users can add an extra layer of security to their online accounts, reducing the risk of unauthorized access and pote2 KB (236 words) - 23:54, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...eats on endpoints, such as computers and mobile devices, enhancing overall security.2 KB (253 words) - 00:24, 30 October 2023
- ...astille Products, offers various options for continuous protection against security threats. The main features of this resource include the Bastille Enterprise Both versions of Bastille Products offer continuous protection against security threats, with the Enterprise version providing a more comprehensive solutio2 KB (218 words) - 23:53, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...m privileges. This feature helps prevent unauthorized access and potential security breaches.2 KB (292 words) - 00:26, 30 October 2023
- ...astille Products, offers various options for continuous protection against security threats. The main features of this resource include the Bastille Enterprise Both versions of Bastille Products offer continuous protection against security threats, with the Enterprise version providing a more comprehensive solutio2 KB (223 words) - 23:53, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...m privileges. This feature helps prevent unauthorized access and potential security breaches.2 KB (294 words) - 23:53, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...m privileges. This feature helps prevent unauthorized access and potential security breaches.2 KB (298 words) - 23:53, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...m privileges. This feature helps prevent unauthorized access and potential security breaches.2 KB (298 words) - 23:54, 25 October 2023
- ...an be used across various applications. Its main purpose is to enhance the security of user accounts by adding an extra layer of protection. ...users can download the Microsoft Authenticator app on their Android or iOS mobile devices. The app can be found on the Google Play Store for Android users an2 KB (237 words) - 23:54, 25 October 2023
- ...o be cross-platform, providing access to your passwords and information on mobile devices and browsers. This allows users to access their passwords wherever ...ion to its convenience, Bitwarden prioritizes security. It offers powerful security measures to protect your sensitive information, giving users peace of mind.2 KB (243 words) - 14:40, 25 October 2023
- This resource is a comprehensive security platform that offers a range of features to protect against various threats ...m privileges. This feature helps prevent unauthorized access and potential security breaches.2 KB (303 words) - 23:54, 25 October 2023