EN Not sure if ethical hacking is right for your business or would you like to go through the possibilities with us regarding ethical hacking and online security? Then contact us
Ағылшын тіліндегі "ethical security researchers" келесі Голландиялық сөздерге/фразаларға аударылуы мүмкін:
EN Not sure if ethical hacking is right for your business or would you like to go through the possibilities with us regarding ethical hacking and online security? Then contact us
NL Weet u niet zeker of ethisch hacken geschikt is voor uw onderneming of wilt u de mogelijkheden eens samen met ons doorlopen met betrekking tot ethisch hacken en online beveiliging? Neem dan eens contact met ons op
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
hacking | hacken |
business | onderneming |
possibilities | mogelijkheden |
online | online |
is | is |
or | of |
security | beveiliging |
contact | contact |
the | de |
and | en |
for | voor |
us | ons |
regarding | betrekking |
you | u |
through | doorlopen |
EN Reincubate has published a responsible disclosure policy for several years now, and we continue to work fruitfully with ethical security researchers on an ad-hoc basis
NL Reincubate heeft al een aantal jaren een beleid voor verantwoorde openbaarmaking gepubliceerd en we blijven op een vruchtbare manier samenwerken met ethische beveiligingsonderzoekers op ad-hocbasis
Ағылшын | Голландиялық |
---|---|
published | gepubliceerd |
responsible | verantwoorde |
disclosure | openbaarmaking |
policy | beleid |
ethical | ethische |
reincubate | reincubate |
we | we |
continue | blijven |
and | en |
basis | een |
on | op |
for | voor |
years | jaren |
EN All product suppliers are asked to comply with an ethical code of conduct that covers health and safety regulations, labor and human rights laws, and ethical business practices
NL Alle leveranciers van producten wordt gevraagd om te voldoen aan een ethische gedragscode, die betrekking heeft op gezondheids- en veiligheidsvoorschriften, arbeids- en mensenrechtenwetten en ethische bedrijfspraktijken
Ағылшын | Голландиялық |
---|---|
asked | gevraagd |
ethical | ethische |
code of conduct | gedragscode |
suppliers | leveranciers |
to | om |
with | op |
and | en |
comply | voldoen aan |
practices | producten |
are | wordt |
all | alle |
of | van |
that | die |
EN Companies today are under pressure to continue to bring products to market quickly, while adhering to new Ethical and Sustainability Governance (ESG) guidelines on strict ethical and sustainability related compliance.
NL Bedrijven staan tegenwoordig onder druk om producten snel op de markt te blijven brengen, terwijl ze zich houden aan de nieuwe Ethical and Sustainability Governance (ESG) -richtlijnen voor strikte ethische en duurzaamheidsgerelateerde compliance.
Ағылшын | Голландиялық |
---|---|
pressure | druk |
quickly | snel |
new | nieuwe |
ethical | ethische |
governance | governance |
esg | esg |
guidelines | richtlijnen |
compliance | compliance |
companies | bedrijven |
continue | blijven |
products | producten |
market | markt |
on | op |
to | om |
and | en |
EN A hacker does this, but with ethical phishing or ethical hacking, the information is lost only moment used or stored
NL Een hacker doet dit wel, maar bij ethisch phishing of ethisch hacken wordt de informatie op geen enkel moment gebruikt of opgeslagen
Ағылшын | Голландиялық |
---|---|
hacker | hacker |
ethical | ethisch |
phishing | phishing |
hacking | hacken |
moment | moment |
stored | opgeslagen |
or | of |
used | gebruikt |
the | de |
information | informatie |
is | wordt |
with | bij |
this | dit |
but | |
a | enkel |
EN The time it takes WebSec for ethical phishing depends on your business, the nature of the testing to be performed, and the issues we encounter during ethical phishing
NL De tijd die WebSec nodig heeft voor ethisch phishing is afhankelijk van uw bedrijf, de aard van de testen die verricht moeten worden en de problemen die we tegenkomen tijdens ethisch phishing
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
phishing | phishing |
business | bedrijf |
nature | aard |
encounter | tegenkomen |
the | de |
we | we |
time | tijd |
issues | problemen |
testing | testen |
be | worden |
depends | afhankelijk |
during | tijdens |
for | voor |
takes | heeft |
of | van |
and | en |
EN We put that on our ethical hackers at work, who use ethical hacking to create a complete attack
NL Wij zetten daarop onze ethische hackers aan het werk, die ethisch hacken inzetten om een complete aanval op te zetten
Ағылшын | Голландиялық |
---|---|
hackers | hackers |
hacking | hacken |
attack | aanval |
complete | complete |
on | op |
work | werk |
to | om |
we | wij |
at | te |
a | een |
our | onze |
that | die |
EN monday.com maintains a managed private bug bounty program, allowing security researchers from around the world to ethically and responsibly research and disclose security vulnerabilities to our Security Team.
NL monday.com onderhoudt een beheerd bugbounty-programma, waarmee beveiligingsonderzoekers van over de hele wereld ethisch en verantwoord beveiligingslekken kunnen onderzoeken en melden aan ons beveiligingsteam.
Ағылшын | Голландиялық |
---|---|
maintains | onderhoudt |
managed | beheerd |
program | programma |
responsibly | verantwoord |
research | onderzoeken |
team | hele |
the | de |
world | wereld |
and | en |
a | een |
our | ons |
EN In addition, the project researchers pay extra attention to the “citizen perspective” when safeguarding public values, which, in the researchers’ view, all too often remains underexposed in legislation and governance.
NL Bovendien besteden de projectonderzoekers extra aandacht aan het ‘burgerperspectief’ bij het borgen van publieke waarden, dat bij wetgeving en bestuur al te vaak onderbelicht blijft volgens de onderzoekers.
Ағылшын | Голландиялық |
---|---|
attention | aandacht |
values | waarden |
legislation | wetgeving |
governance | bestuur |
often | vaak |
remains | blijft |
researchers | onderzoekers |
and | en |
the | de |
in | bij |
too | te |
to | extra |
EN The Vici grant targets highly experienced researchers who have successfully demonstrated the ability to develop their own innovative lines of research, and to act as coaches for young researchers
NL De Vici is bestemd voor zeer ervaren onderzoekers die met succes hebben aangetoond een eigen vernieuwende onderzoekslijn tot ontwikkeling te kunnen brengen en die als coach voor jonge onderzoekers kunnen fungeren
Ағылшын | Голландиялық |
---|---|
experienced | ervaren |
researchers | onderzoekers |
demonstrated | aangetoond |
young | jonge |
the | de |
own | eigen |
act | fungeren |
as | als |
successfully | met succes |
and | en |
for | voor |
to | brengen |
highly | zeer |
have | hebben |
of | een |
EN The Vici grant targets highly experienced researchers who have successfully demonstrated the ability to develop their own innovative lines of research, and to act as coaches for young researchers
NL De Vici is bestemd voor zeer ervaren onderzoekers die met succes hebben aangetoond een eigen vernieuwende onderzoekslijn tot ontwikkeling te kunnen brengen en die als coach voor jonge onderzoekers kunnen fungeren
Ағылшын | Голландиялық |
---|---|
experienced | ervaren |
researchers | onderzoekers |
demonstrated | aangetoond |
young | jonge |
the | de |
own | eigen |
act | fungeren |
as | als |
successfully | met succes |
and | en |
for | voor |
to | brengen |
highly | zeer |
have | hebben |
of | een |
EN In addition, the project researchers pay extra attention to the “citizen perspective” when safeguarding public values, which, in the researchers’ view, all too often remains underexposed in legislation and governance.
NL Bovendien besteden de projectonderzoekers extra aandacht aan het ‘burgerperspectief’ bij het borgen van publieke waarden, dat bij wetgeving en bestuur al te vaak onderbelicht blijft volgens de onderzoekers.
Ағылшын | Голландиялық |
---|---|
attention | aandacht |
values | waarden |
legislation | wetgeving |
governance | bestuur |
often | vaak |
remains | blijft |
researchers | onderzoekers |
and | en |
the | de |
in | bij |
too | te |
to | extra |
EN Not sure if Security Awareness is beneficial to your business? Then contact us, ethical phishing is probably the best way to find out whether Security Awareness is necessary for your company.
NL Weet u niet zeker of Security Awareness nuttig is voor uw bedrijf? Neem dan contact met ons op; waarschijnlijk is ethisch phishing dé manier om erachter te komen of Security Awareness noodzakelijk is voor uw onderneming.
Ағылшын | Голландиялық |
---|---|
beneficial | nuttig |
contact | contact |
ethical | ethisch |
phishing | phishing |
probably | waarschijnlijk |
necessary | noodzakelijk |
awareness | awareness |
security | security |
is | is |
way | manier |
find out | erachter |
to | om |
whether | of |
not | niet |
out | te |
the | zeker |
EN Tags:remote security, remote work security risks, remote workplace security, security issues with working remotely, security tips for working remotely, working remotely
NL Tags:beveiliging op afstand, beveiligingsrisico's bij werken op afstand, beveiliging van de werkplek op afstand, beveiligingsproblemen bij werken op afstand, beveiligingstips voor werken op afstand, werken op afstand
Ағылшын | Голландиялық |
---|---|
tags | tags |
security | beveiliging |
workplace | werkplek |
remotely | op afstand |
for | voor |
remote | afstand |
with | bij |
work | werken |
issues | van de |
EN Tags:information security, information security definition, information security meaning, what is information security, why is information security important
NL Tags:informatiebeveiliging, informatiebeveiliging definitie, informatiebeveiliging betekenis, wat is informatiebeveiliging, waarom is informatiebeveiliging belangrijk
Ағылшын | Голландиялық |
---|---|
tags | tags |
definition | definitie |
important | belangrijk |
information security | informatiebeveiliging |
is | is |
why | waarom |
what | wat |
meaning | betekenis |
EN Tags:best information security controls, information security, information security controls, security controls, underrated information security controls
NL Tags:beste informatiebeveiligingscontroles, informatiebeveiliging, informatiebeveiligingscontroles, onderschatte informatiebeveiligingscontroles
Ағылшын | Голландиялық |
---|---|
tags | tags |
best | beste |
information security | informatiebeveiliging |
EN gives security researchers, as well as customers, an avenue for safely testing and notifying Zendesk of security vulnerabilities through our partnership with
NL stelt beveiligingsonderzoekers en onze klanten in de gelegenheid om Zendesk op een veilige manier te testen op beveiligingsproblemen en Zendesk over de bevindingen te informeren. Dit is mogelijk dankzij onze samenwerking met
Ағылшын | Голландиялық |
---|---|
customers | klanten |
testing | testen |
zendesk | zendesk |
partnership | samenwerking |
gives | is |
safely | veilige |
with | op |
and | en |
our | in |
as | stelt |
EN Participating Marketplace Partners are able to proactively combat security risks before they arise by incentivizing security researchers to find vulnerabilities
NL Deelnemende Marketplace-partners kunnen beveiligingsrisico's proactief bestrijden voordat ze zich voordoen door beveiligingsonderzoekers die kwetsbaarheden vinden, te belonen
Ағылшын | Голландиялық |
---|---|
participating | deelnemende |
partners | partners |
proactively | proactief |
vulnerabilities | kwetsbaarheden |
they | ze |
before | voordat |
find | vinden |
to | bestrijden |
by | door |
EN Participating Marketplace Partners are able to proactively combat security risks before they arise by incentivizing security researchers to find vulnerabilities
NL Deelnemende Marketplace-partners kunnen beveiligingsrisico's proactief bestrijden voordat ze zich voordoen door beveiligingsonderzoekers die kwetsbaarheden vinden, te belonen
Ағылшын | Голландиялық |
---|---|
participating | deelnemende |
partners | partners |
proactively | proactief |
vulnerabilities | kwetsbaarheden |
they | ze |
before | voordat |
find | vinden |
to | bestrijden |
by | door |
EN Some app partners have also chosen to participate in our public bug bounty program, where apps are tested by a pool of security researchers. You’ll see a “Cloud Security Participant” badge on their app listing.
NL Sommige app-partners hebben er ook voor gekozen om deel te nemen aan ons openbare Bug bounty-programma, waarbij apps door onderzoekers worden getest op veiligheid. Je ziet een 'Cloud Security Participant'-badge bij hun app-vermelding.
Ағылшын | Голландиялық |
---|---|
chosen | gekozen |
public | openbare |
researchers | onderzoekers |
tested | getest |
cloud | cloud |
to | om |
where | waarbij |
on | op |
in | bij |
see | ziet |
also | ook |
apps | apps |
some | sommige |
are | worden |
their | hun |
our | ons |
of | deel |
by | door |
have | hebben |
security | security |
a | een |
EN If You have any ethical, integrity, safety, security, and/or compliance concerns about Splashtop or its employees, You are encouraged to report the incident anonymously at https://www.splashtop.com/anonymous-reporting
NL Als u zich zorgen maakt over ethiek, integriteit, veiligheid, beveiliging en/of naleving van Splashtop of haar werknemers, wordt u aangemoedigd om het incident anoniem te melden op https://www.splashtop.com/anonymous-reporting
Ағылшын | Голландиялық |
---|---|
compliance | naleving |
concerns | zorgen |
splashtop | splashtop |
employees | werknemers |
encouraged | aangemoedigd |
incident | incident |
https | https |
integrity | integriteit |
or | of |
security | beveiliging |
and | en |
to | om |
safety | veiligheid |
at | te |
the | wordt |
if | als |
you | u |
to report | melden |
EN Ethical phishing for the security of your business
NL Ethisch phishing voor de veiligheid van uw bedrijf
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
phishing | phishing |
security | veiligheid |
business | bedrijf |
the | de |
for | voor |
of | van |
EN It's up to your Blue Team and online security to be our ethical hackers to stop
NL Aan uw Blue Team en online beveiliging de taak om onze ethische hackers te stoppen
Ағылшын | Голландиялық |
---|---|
team | team |
online | online |
security | beveiliging |
ethical | ethische |
hackers | hackers |
to | om |
our | onze |
and | en |
blue | blue |
EN Regularly conduct tests, for example by ethical hackers or let it off conducting pentests is a useful way of obtaining all possible insights to get about the state of your information security
NL Regelmatig testen uitvoeren, bijvoorbeeld door ethische hackers of het uit laten voeren van pentesten, is een handige manier om alle mogelijke inzichten te krijgen over de staat van uw informatiebeveiliging
Ағылшын | Голландиялық |
---|---|
regularly | regelmatig |
tests | testen |
ethical | ethische |
hackers | hackers |
useful | handige |
possible | mogelijke |
information security | informatiebeveiliging |
or | of |
way | manier |
insights | inzichten |
conduct | voeren |
is | is |
the | de |
to | om |
let | laten |
by | door |
conducting | uitvoeren |
EN Ethical phishing is useful when you want to make sure that your employees' online security knowledge is in order
NL Ethisch phishing is nuttig wanneer u zeker wilt weten dat de staat van de online veiligheidskennis bij uw medewerkers op orde is
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
phishing | phishing |
useful | nuttig |
employees | medewerkers |
online | online |
order | orde |
in | bij |
is | is |
want | wilt |
you | u |
sure | dat |
your | de |
when | wanneer |
EN Ethical hacking is a test of your security and network
NL Ethisch hacken is een test voor uw beveiliging en netwerk
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
hacking | hacken |
security | beveiliging |
network | netwerk |
is | is |
test | test |
and | en |
a | een |
EN Ethical hacking allows you to check and demonstrate security
NL U kunt met ethisch hacken de beveiliging controleren en aantonen
Ағылшын | Голландиялық |
---|---|
ethical | ethisch |
hacking | hacken |
demonstrate | aantonen |
security | beveiliging |
and | en |
to | met |
you | u |
check | controleren |
EN If You have any ethical, integrity, safety, security, and/or compliance concerns about Splashtop or its employees, You are encouraged to report the incident anonymously at https://www.splashtop.com/anonymous-reporting
NL Als u zich zorgen maakt over ethiek, integriteit, veiligheid, beveiliging en/of naleving van Splashtop of haar werknemers, wordt u aangemoedigd om het incident anoniem te melden op https://www.splashtop.com/anonymous-reporting
Ағылшын | Голландиялық |
---|---|
compliance | naleving |
concerns | zorgen |
splashtop | splashtop |
employees | werknemers |
encouraged | aangemoedigd |
incident | incident |
https | https |
integrity | integriteit |
or | of |
security | beveiliging |
and | en |
to | om |
safety | veiligheid |
at | te |
the | wordt |
if | als |
you | u |
to report | melden |
EN For the security of data, Combell employs specific people who monitor compliance with legislation and ethical aspirations
NL Voor de beveiliging van gegevens heeft Combell specifieke personen in dienst die toezien op de naleving van de wetgeving en de ethische aspiraties
Ағылшын | Голландиялық |
---|---|
security | beveiliging |
combell | combell |
people | personen |
compliance | naleving |
legislation | wetgeving |
ethical | ethische |
with | op |
the | de |
data | gegevens |
and | en |
of | van |
for | voor |
EN AWS on-site security includes a number of features such as security guards, fencing, security video feeds, intrusion detection technology and other security measures.
NL AWS-beveiliging on-site bestaat uit diverse functies, waaronder bewakers, hekwerken, beveiligingscamera's, inbraakdetectietechnologie en andere beveiligingsmaatregelen.
Ағылшын | Голландиялық |
---|---|
aws | aws |
features | functies |
security | beveiliging |
and | en |
other | andere |
security measures | beveiligingsmaatregelen |
of | uit |
a | diverse |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN AWS on-site security includes a number of features such as security guards, fencing, security feeds, intrusion detection technology and other security measures.
NL AWS-beveiliging on-site beslaat diverse functies, waaronder bewakers, hekwerken, beveiligingscamera's, technologie voor inbraakdetectie en andere beveiligingsmaatregelen.
Ағылшын | Голландиялық |
---|---|
aws | aws |
features | functies |
technology | technologie |
security | beveiliging |
other | andere |
security measures | beveiligingsmaatregelen |
and | en |
of | voor |
a | diverse |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN Detailed information about AWS security is available at https://aws.amazon.com/security/ and http://aws.amazon.com/security/sharing-the-security-responsibility/
NL Gedetailleerde informatie over de beveiliging van AWS is beschikbaar op https://aws.amazon.com/security/ en http://aws.amazon.com/security/sharing-the-security-responsibility/
Ағылшын | Голландиялық |
---|---|
aws | aws |
is | is |
https | https |
amazon | amazon |
http | http |
about | over |
the | de |
detailed | gedetailleerde |
information | informatie |
available | beschikbaar |
and | en |
security | beveiliging |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN Detailed information about AWS security is available at https://aws.amazon.com/security/ and http://aws.amazon.com/security/sharing-the-security-responsibility/
NL Gedetailleerde informatie over de beveiliging van AWS is beschikbaar op https://aws.amazon.com/security/ en http://aws.amazon.com/security/sharing-the-security-responsibility/
Ағылшын | Голландиялық |
---|---|
aws | aws |
is | is |
https | https |
amazon | amazon |
http | http |
about | over |
the | de |
detailed | gedetailleerde |
information | informatie |
available | beschikbaar |
and | en |
security | beveiliging |
EN --- Please choose your product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus for Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security for Android G DATA Internet Security for iOS G DATA VPN Other
NL --- Kies uw product --- G DATA AntiVirus G DATA Internet Security G DATA Total Security G DATA Antivirus voor Mac G DATA InternetSecurity Privacy Edition G DATA Internet Security voor Android G DATA Internet Security voor iOS G DATA VPN Anders
Ағылшын | Голландиялық |
---|---|
choose | kies |
your | uw |
product | product |
g | g |
data | data |
antivirus | antivirus |
internet | internet |
mac | mac |
edition | edition |
android | android |
ios | ios |
vpn | vpn |
other | anders |
total | total |
for | voor |
privacy | privacy |
security | security |
EN Security researchers can receive cash payments in exchange for a qualifying vulnerability report submitted to Atlassian via our bounty programs.
NL Beveiligingsonderzoekers kunnen betalingen ontvangen in ruil voor gekwalificeerde kwetsbaarheidsrapporten ingediend bij Atlassian via onze bountyprogramma's.
Ағылшын | Голландиялық |
---|---|
payments | betalingen |
exchange | ruil |
submitted | ingediend |
atlassian | atlassian |
receive | ontvangen |
in | in |
for | voor |
via | via |
EN The Vulnerability Disclosure Program provides another channel for customers or security researchers to report cloud app vulnerabilities to Atlassian and to Marketplace Partners
NL Het programma voor openbaar maken van kwetsbaarheden biedt klanten en beveiligingsonderzoekers een andere manier om kwetsbaarheden van cloudapps te melden aan Atlassian en aan Marketplace-partners
Ағылшын | Голландиялық |
---|---|
provides | biedt |
customers | klanten |
atlassian | atlassian |
partners | partners |
to | om |
program | programma |
vulnerabilities | kwetsbaarheden |
for | voor |
to report | melden |
and | en |
another | van |
EN Crowdsourcing vulnerability discovery augments the skills of your team by providing access to a skilled pool of security researchers.
NL Het ontdekken van kwetsbaarheden door middel van crowdsourcing vergroot de vaardigheden van je team doordat je toegang krijgt tot een groep competente beveiligingsonderzoekers.
Ағылшын | Голландиялық |
---|---|
vulnerability | kwetsbaarheden |
discovery | ontdekken |
skills | vaardigheden |
access | toegang |
your | je |
team | team |
the | de |
a | een |
of | van |
by | door |
EN We have developed this policy to both reflect our corporate values and to uphold our legal responsibility to good-faith security researchers that are providing us with their expertise.
NL We hebben dit beleid ontwikkeld om zowel onze bedrijfswaarden te weerspiegelen als om onze wettelijke verantwoordelijkheid te behouden aan goeder trouwe veiligheidsonderzoekers die ons hun expertise ter beschikking stellen.
Ағылшын | Голландиялық |
---|---|
developed | ontwikkeld |
reflect | weerspiegelen |
responsibility | verantwoordelijkheid |
expertise | expertise |
good | goeder |
policy | beleid |
their | hun |
we | we |
to | om |
legal | wettelijke |
this | dit |
have | hebben |
both | zowel |
our | onze |
EN STRENGTHS: 24/7 globally distributed threat analysts, researchers, and data scientists provide continuous application learning and security expertise
NL STERKTE PUNTEN: 24/7 beschikbaarheid van wereldwijd opererende bedreigingsanalisten, onderzoekers en informatici die continu kennis van toepassingen en beveiligingsexpertise leveren
Ағылшын | Голландиялық |
---|---|
globally | wereldwijd |
provide | leveren |
continuous | continu |
application | toepassingen |
researchers | onderzoekers |
and | en |
{Totalresult} аударманың 50 көрсетілуде