Поиск по тегу «appstore» в разделе Видеокаталог

HD 00:02:29
Change 2017: Какие приложения нужны клиентам
Перед нашей первой конференцией для разработчиков Change 2017 мы попросили трех предпринимателей рассказать о своих идеях и потребностях по автоматизации бизнеса. На самом деле, таких идей очень много - и благодаря магазину приложений ...
Cмотреть видео
HD 00:16:31
Возможности SDK смарт-терминала Эвотор (Илья Линник)
Про возможности SDK смарт-терминала Эвотор  рассказывает Илья Линник, руководитель направления разработки ПО устройства
Cмотреть видео
HD 00:12:18
Выступление на конференции Change 2017 - Антон Шмаков: Quick Resto для Эвотора
Как автоматизировать HoReCa при помощи Эвотора и Quick Resto. - Антон Шмаков, генеральный директор Quick RestoЧтобы стать разработчиком приложений под Эвотор, заходите на Сайт Эвотора
Cмотреть видео
HD 00:02:22
Check Point: Securing Data Exchange with SandBlast and Safe-T HDS
Organizations today face host of challenges in securing high risk data. SandBlast is most advanced protection against zero-day malware threats, while Safe-T HDS secures all data exchange scenarios including human data exchange such as secu...
Cмотреть видео
HD 00:03:20
Check Point: 2017 Mobile Security Media Tour
Our Michael Shaulov, Head of Product, Mobile Security discusses the importance of mobile security and common vulnerabilities and threats mobile data of individuals and the enterprise. For more information:
Cмотреть видео
HD 00:02:37
Check Point: Protecting Mobile Devices Together - ElevenPaths – Telefonica and | Mobile Security
“Mobile devices are critical to the way we do business today. With cyberattacks growing in sophistication and frequency, exposing both the business and personal data we store on smartphones and tablets, mobile devices are the newest enterpr...
Cмотреть видео
HD 00:01:50
Check Point: Hamas’ Cyber Tactics Exposed - Attacking IDF Soldier’s Mobile Phones
The Israeli Defense Forde uncovered a Hamas network that reached out to IDF soldiers online, sometimes in romantic ways, and ask them to download applications that would infect them with Trojan horse viruses. The applications used by Hamas ...
Cмотреть видео
HD 00:01:41
Check Point: From HummingBad to Worse: Android Malware Campaign | SandBlast Mobile Security
For five months, mobile threat researchers had unprecedented access to the inner-workings of Yingmob, the Chinese cyber criminals behind HummingBad, a malware that establishes a persistent rootkit on Android devices, generates fraudulent a...
Cмотреть видео
HD 00:01:41
Check Point: Viking Horde: A New Type of Android Malware on Google Play | Mobile Security
Blog: More information: The research team uncovered a new Android malware campaign on Google Play it calls Viking Horde. Viking Horde conducts ad fraud, but can also be used for other attack purposes such as DDoS attacks, spam messages...
Cмотреть видео
HD 00:03:59
Check Point: Pokemon GO Repackaged Malware Demonstration | SandBlast Mobile Security Demo
The excitement over the new game Pokemon GO has taken the world by storm. Because it's available only in limited countries right now, some people may be tempted to download the app from sources other than Google Play or the Apple App Store....
Cмотреть видео
HD 00:02:48
Check Point: Samsung Research America Chooses Mobile Threat Prevention
As the research arm of an industry-leading manufacturer of consumer electronics, Samsung Research America is committed to forward-looking innovation and bringing new products to market ahead of competitors. More Info: The last thing it n...
Cмотреть видео
HD 00:04:02
Check Point: SideStepper: Anatomy of an iOS Vulnerability | Mobile Threat Prevention
For more information, visit: Report: IDC Technology Spotlight: Why Comprehensive Security Requires Mobile Threat Prevention: disclosed details about SideStepper, a vulnerability that can be used to install malicious enterprise apps o...
Cмотреть видео
HD 00:01:32
Check Point: SandBlast Mobile Security: Man-in-the-Middle Mobile Attacks
Our mobile devices are more vulnerable then we think. A man-in-the middle attack is a potential threat every time you connect to a Wi-Fi network. For more information: Imagine you are at a coffee shop and you want to connect to Wi-Fi and...
Cмотреть видео
HD 00:02:17
Check Point: Big Bad Mobile Threats of 2015 - Mobile Threat Prevention
The mobile threat landscape changed dramatically in 2015. Simple hacks and rudimentary malware was quickly replaced by sophisticated cyber thieves who know exactly what sensitive data they can take from you and how. Along with the growing s...
Cмотреть видео
HD 00:01:10
Check Point: RSA 2016: Prevent Cyberattacks from Entering the Endpoint with SandBlast Agent
More information:
Cмотреть видео
HD 00:01:18
Check Point: RSA 2016: Mobile Threat Prevention | Mobile Security
For more information visit:
Cмотреть видео
HD 00:03:39
Check Point: Mobile Threat Prevention Demo - Malware Invasion on an iOS Device
In this video, demonstrates an end-to-end threat and remediation situation on an iOS device using Mobile Threat Prevention. To learn more about Mobile Threat Prevention for iOS and Android devices, visit Report: IDC Technology Spotligh...
Cмотреть видео
HD 00:01:12
Check Point: : A Founding Member of the AirWatch Mobile Security Alliance | Mobile Threat Prevention
President Amnon Bar-Lev addresses the audience during the keynote speech at AirWatch Connect 2015 in Atlanta on September 22, 2015, and announces ’s participation as a founding member of the AirWatch Mobile Security Alliance.
Cмотреть видео
HD 00:02:24
Check Point: Stop Advanced Mobile Threats Before They Start | SandBlast Mobile Security
Learn More: Report: IDC Technology Spotlight: Why Comprehensive Security Requires Mobile Threat Prevention: Cyber criminals may be stealing data from your smartphone or tablet without your knowledge. They’re experts at exploiting vulner...
Cмотреть видео
 00:52:51
Check Point: The Security Zone Ep. 4: Bridge the Enterprise Mobile Security Gap
Mobile security continues to be a challenge for organizations providing business access on mobile platforms, whether it is on corporate owned or personal devices. While point products provide help with addressing some concerns, they do not ...
Cмотреть видео