Cognitive Bias in Incident Response

By Gavin Reid This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of IT, he nailed […]

Source:: Cisco Security Notice

Fortinet to Provide Enterprises With On-Demand Security at Scale With Verizon Virtual Network Services

Fortinet to Provide Enterprises With On-Demand Security at Scale With Verizon Virtual Network Services

Source:: Fortinet

Fortinet to Provide Enterprises With On-Demand Security at Scale With Verizon Virtual Network Services

Fortinet to Provide Enterprises With On-Demand Security at Scale With Verizon Virtual Network Services

Source:: Fortinet

Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program

By Michelle Fleury When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]

Source:: Cisco Security Notice

Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program

By Michelle Fleury When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]

Source:: Cisco Security Notice

Großes Danke. Kleine Preise. 15 Jahre value4you

Großes Danke. Kleine Preise. 15 Jahre value4you

2016-07-14_11h45_52

15 Jahre gibt es sie, die preiswerten FUJITSU value4you-Modelle. Egal, ob Server, PC oder Notebook, value4you steht für schnelle Verfügbarkeit und gute Preise für gängige Modelle und Konfigurationen, die beim Distributor ab Lager erhältlich sind. Zum Jubiläum haben wir für Sie besonders günstige Angebote kalkuliert:

 Display E24T-7 PRO
 Beste Energieeffizienz und Top-Komfort fürs Office

  • 60,5 cm (23,8“) IPS Panel, 1.920 x 1.080 Pixel
  • Schnittstellen: HDMI, DVI und VGA
  • Lautsprecher
  • Energieeffizienz: Klasse A+

   119,90 € **

 ESPRIMO Q556
 Der Mini mit mehr PC pro m³

  • Intel® Core™ i3-6100T Prozessor (3M Cache, bis zu 3,20 GHz)
  • Windows 7 Professional 64-bit vorinstalliert – mit Windows 10 Pro 64-bit Lizenz*
  • 4 GB DDR4, 500 GB HDD SATA III, DVD Super Multi Ultraslim (Tray) SATA

   419,90 € **

 ESPRIMO P556
 Ihr flexibler und wirtschaftlicher PC

  • Intel® Core™ i5-6400 Prozessor (6M Cache, bis zu 3,30 GHz)
  • Windows 7 Professional 64-bit vorinstalliert – mit Windows 10 Pro 64-bit Lizenz*
  • 8 GB DDR4, 256 GB SSD SATA III, DVD Super Multi SATA

  519,90 € **

 LIFEBOOK A556
 Ihr unentbehrlicher, leistungsfähiger Partner

  • Intel® Core™ i5-6200U Prozessor (3M Cache, bis zu 2,80 GHz)
  • Windows 7 Professional 64-bit vorinstalliert – mit Windows 10 Pro 64-bit Lizenz*
  • 8 GB DDR4, 256 GB SSD SATA III, DVD Super Multi
  • 39,6 cm (15,6“) Anti-Glare-Display, HD

  519,90 € **

 LIFEBOOK E554
 Ihr zuverlässiger Geschäftspartner

  • Intel® Core™ i5-4210M Prozessor (3M Cache, bis zu 3,20 GHz)
  • Windows 7 Professional 64-bit vorinstalliert – mit Windows 10 Pro 64-bit Lizenz*
  • 8 GB DDR3 L, 256 GB SSD SATA III, DVD Super Multi
  • 39,6 cm (15,6“) Anti-Glare-Display HD, Docking-fähig, Fingerprint-Sensor

 624,90 € **

 CELSIUS W550
 Erschwinglich, erweiterbar, skalierbar

  • Intel® Core™ i5-6500 vPro™ Prozessor (6M Cache, bis zu 3,60 GHz)
  • Windows 7 Professional 64-bit vorinstalliert – mit Windows 10 Pro 64-bit Lizenz*
  • 8 GB DDR4, 256 GB SSD SATA III, 1.000 GB HDD SATA III, DVD Super Multi
  • NVIDIA® Quadro® K620 (2 GB), Intel® HD Graphics 530 (bis zu 1.782 MB)

 734,90 € **

* Recovery DVD Windows 10 Pro (64-bit) und Windows 7 Professional (32/64-bit)

** Alle Preise exkl. MwSt

Änderungen bei den technischen Daten vorbehalten. Lieferung unter dem Vorbehalt der Verfügbarkeit. Haftung oder Garantie für Vollständigkeit, Aktualität und Richtigkeit der Daten und Abbildungen ausgeschlossen. Wiedergegebene Bezeichnungen können Marken und/oder Urheberrechte der jeweiligen Hersteller sein, deren Benutzung durch Dritte für eigene Zwecke die Rechte der Eigentümer verletzen kann. Änderungen und Irrtümer vorbehalten. Die Die Geräte sind einmalig innerhalb der Aktion zum Aktions-Sonderpreis bestellbar. Die Bestellung ist nicht kombinierbar mit weiteren Rabatt-Aktionen.  Fujitsu Technology Solutions behält sich vor, die Aktion zu jedem Zeitpunkt ohne Angabe von Gründen zu ändern, abzubrechen oder zu beenden.

Weitere Informationen und Bestellmöglichkeit bei unseren Kollegen:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net

Vulnerability Spotlight: Oracle’s Outside In Technology, Turned Inside-Out

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic. Blog post authored by Jaeson Schultz and Aleksandar Nikolic. One of the most fundamental tasks performed by many software programs involves the reading, writing, and general processing of files. In today’s highly networked environments, files and the programs that process them can be found just about everywhere: FTP transfers, HTTP […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Oracle’s Outside In Technology, Turned Inside-Out

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic. Blog post authored by Jaeson Schultz and Aleksandar Nikolic. One of the most fundamental tasks performed by many software programs involves the reading, writing, and general processing of files. In today’s highly networked environments, files and the programs that process them can be found just about everywhere: FTP transfers, HTTP […]

Source:: Cisco Security Notice

How Cybersecurity is Enabling – not Defeating – Business Innovation

By Steve Martino The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]

Source:: Cisco Security Notice

How Cybersecurity is Enabling – not Defeating – Business Innovation

By Steve Martino The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]

Source:: Cisco Security Notice