A computer software package that manages and maintains lists of issues.
A technology that allows you to make voice calls using a broadband Internet connection.
Looks for threats and monitors the behavior of all programs, flagging suspicious behavior.
Software protects against infections caused by many types of malware.
- Office 365
Real-time, round-the-clock monitoring servers & workstations.
Resuming normal operations following a disaster by regaining access to data.
Provides users with a system for the backup, storage, and recovery of computer files.
Restricts or controls the content an Internet user is capable to access.
Protect networks against threats from both outside and inside the network.
Hardware used to connect one network device to other network devices.
Application that monitors a systems for malicious activity or policy violations.