evosoft

evosoft.hu

The evosoft Group is an international system house that has developed custom-made software solutions since 1995. Moreover, evosoft competently accompanies its clients in all phases that include consultation, design, development, testing, implementation, training and operations in daily business.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY

BALBIX EXTENDS CYBER SECURITY POSTURE AUTOMATION TO AWS

Balbix | November 02, 2021

news image

Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of the Balbix Connector for AWS. As a result of the new offering, customers gain a comprehensive inventory of their assets spanning on-premises and cloud as well as the ability to discover, prioritize and mitigate unseen risks, including unpatched software vulnerabilities, weak credentials, missing or poor encryption, trust issues and cloud infrastructure misconfigu...

Read More

UNISYS SECURES BIOMETRIC IDENTITY MANAGEMENT ON CLOUD WITH NEW VERSIONS OF STEALTH(IDENTITY)™ SOFTWARE

Unisys | July 21, 2020

news image

Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) str...

Read More

DATA SECURITY

LAUNCHING BLACKBERRY JARVIS 2.0, BLACKBERRY TO ADDRESS GLOBAL EMBEDDED CYBERSECURITY LANDSCAPE

BlackBerry | July 27, 2021

news image

BlackBerry Limited (NYSE: BB; TSX: BB) has announced the release of the latest edition of the company's flagship software composition analysis tool, BlackBerry Jarvis 2.0. A SaaS version of the original Jarvis capabilities is introduced in the BlackBerry Jarvis 2.0. This provides integrators and developers a more focused and user-friendly feature set around the three most important areas, which those building mission-critical applications want to authenticate to confirm the su...

Read More

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Cyware | March 07, 2020

news image

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More
news image

DATA SECURITY

BALBIX EXTENDS CYBER SECURITY POSTURE AUTOMATION TO AWS

Balbix | November 02, 2021

Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of the Balbix Connector for AWS. As a result of the new offering, customers gain a comprehensive inventory of their assets spanning on-premises and cloud as well as the ability to discover, prioritize and mitigate unseen risks, including unpatched software vulnerabilities, weak credentials, missing or poor encryption, trust issues and cloud infrastructure misconfigu...

Read More
news image

UNISYS SECURES BIOMETRIC IDENTITY MANAGEMENT ON CLOUD WITH NEW VERSIONS OF STEALTH(IDENTITY)™ SOFTWARE

Unisys | July 21, 2020

Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) str...

Read More
news image

DATA SECURITY

LAUNCHING BLACKBERRY JARVIS 2.0, BLACKBERRY TO ADDRESS GLOBAL EMBEDDED CYBERSECURITY LANDSCAPE

BlackBerry | July 27, 2021

BlackBerry Limited (NYSE: BB; TSX: BB) has announced the release of the latest edition of the company's flagship software composition analysis tool, BlackBerry Jarvis 2.0. A SaaS version of the original Jarvis capabilities is introduced in the BlackBerry Jarvis 2.0. This provides integrators and developers a more focused and user-friendly feature set around the three most important areas, which those building mission-critical applications want to authenticate to confirm the su...

Read More
news image

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Cyware | March 07, 2020

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More