NIS2 #12: Employee monitoring

NIS2 #12: Employee monitoring Labor monitoring in light of the new requirements of the NIS2 [...]

NIS2 #11: Patch management

NIS2 #11: Patch management Centrally manage updates using the eAuditor agent Ask for a quote [...]

Data security with eAuditor IAM in the context of RODO

Data security with eAuditor IAM in the context of RODO Your support in protecting personal [...]

NIS2 #10: BitLocker disk encryption

NIS2 #10: BitLocker disk encryption Find out if your organization is ready for change Ask [...]

NIS2 #9: USB encryption

NIS2 #9: USB encryption Incident monitoring and reporting under NIS2 - what do you need [...]

NIS2 #8: Software monitoring

NIS2 #8: Software monitoring Find out how to identify installed software on devices Ask for [...]

NIS2 #7: USB monitoring

NIS2 #7: USB monitoring Learn how to monitor USB drives used by employees Ask for [...]

Inventory of IT equipment and assets in one place

Inventory of IT equipment and assets in one place Optimization and security with eAuditor Ask [...]