Implementation of eAuditor in the IT industry

CASE STUDY Implementation of eAuditor at Macrix Polska Sp. z o.o. [...]

Anonymization and pseudonymization in IT

Anonymization and pseudonymization in IT Anonymization and pseudonymization guarantees data security, so it works well in [...]

An effective IT management system – what to follow?

An effective IT management system - what to follow? Interview with Technical Support Engineer [...]

Monitoring of employee activity

Monitoring of employee activity Detailed employee information allows even more efficient management of personnel activities [...]

eAuditor and eHelpDesk in the Azure cloud CASE STUDY

CASE STUDY Implementation of eAuditor and eHelpDesk in the Azure cloud [...]

IT security for healthcare CASE STUDY

CASE STUDY Implementation of eAuditor at the Independent Public Health Care Institution in [...]

IT network monitoring – running your business safely

IT network monitoring - running your business safely It enables ongoing control of the network, influences [...]