Datasheets

Download our comprehensive datasheets on the key topics

GDPR

The General Data Protection Regulation (GDPR) is a new EU law that will replace (in the UK) the Data Protection Act 1998.

The GDPR protects the ‘personal data’of people (‘natural persons’). ‘Personal data’ is any information relating to an identified or identifiable natural person (a ‘data subject’).

Full Disk Encryption

Data is the most important asset in the digital economy. Employees carrying a laptop loaded with company sensitive information during business trips or commute are exposed to risk of losing or theft.

Backup & Disaster Recovery

At IT Hotdesk we offer a full range of Disaster Recovery services, from initial consultancy, helping you to define your IT availability strategy and DR Plan through to design and implementing of tailor made DR solutions.

Atlas - Vulnerability Assessment 

The complexities surrounding today’s computers and networks require regular “vulnerability” scanning and remediation to detect and defend against the evolving threats from hackers who use holes in these systems to create a potentially devastating effect on your business. Constant changes to devices, configurations, applications and even new patches can leave you susceptible to an attack, even if you are keeping your security controls up to date.

Web Surfing Control

Spam mail messages have been the plague of email since the very first day of email, unfortunately they have kept growing and evolving overtime. Despite the numerous attempts of creation of anti-spam tools, there’s still a very high number of unwanted messages sent every day. Some of these messages can contain unwanted payloads, phishing attempts or messages that contains unwanted content.

Cyber Essentials

Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security.

Next Generation Firewall

The IT Hotdesk NextGen Firewall is designed and built from the ground up to provide comprehensive, next-generation firewall capabilities. Cloud-hosted content filtering and reporting offload compute-intensive tasks to the cloud for greater resource efficiency and throughput.

Penetration Testing

Penetration testing (also called ‘pen testing’ or more commonly ‘ethical hacking’) is the practice of testing computer systems, networks, and web-applications to find vulnerabilities that attackers could exploit.

Phishing Awareness

Phishing emails are fraudulent attempts to steal information or infect the computer you are using with malware. An important way to protect yourself is to learn how to recognise a phishing email attempt.

Antiviral & Antimalware

Using next-gen layered approach, Bitdefender GravityZone(GZ) combines proven machine learning algorithms, advanced behavioural monitoring and hardening of all desktops, laptops and servers to block even the most sophisticated threats.

Multi-factor Authentication

Today, more than ever, people are increasingly connected. With smartphones, tablets, laptops, and PCs, people have multiple options to access their accounts and applications from anywhere and stay connected at any time. Multi-Factor Authentication is an easy to use, scalable, and reliable solution that provides a second method of authentication to protect your users and of course your systems.

The Cyber Security Playbook

Enquire

The form was submitted. Thank you!
PageLines
WP-Backgrounds Lite by InoPlugs Web Design and Juwelier Schönmann 1010 Wien