Video-Demo-Tour

Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
Blog

Blog

Blog
Cybersecurity and AI: Time for a New Engine
22.07.2024
It's hard to imagine today's world without ChatGPT or other artificial intelligence. It is everywhere—in our lives, in our computers, phones—and steadily integrates itself into our daily routines.
Blog
Digital Certificates
09.06.2024
A digital certificate is a virtual ID, much like a passport, a driver’s license, or any other form of identification. It can be described as a digital credential that contains information identifying an entity, along with other supporting data.
Blog
The CyberHall of Fame: Famous Faces in Cybersecurity
06.06.2024
The world of cybersecurity is a thrilling one, filled with constant challenges and evolving threats. But behind the scenes, there are some legendary figures who have shaped the landscape we see today.
Blog
S/MIME
10.03.2024
Email offers convenience and efficiency that has made this digital communication method indispensable in everyday life.
Blog
Indicators of Compromise
13.11.2023
With communication infrastructures, one of the main concerns is preventing threats and any suspicious activity that could compromise the security of computer networks.
Blog
IoT: Internet of Things
18.09.2023
 The term Internet of Things (IoT) refers to environments where objects, sensors, and everyday items that are not generally considered computers are embedded with network connectivity and computing capability, allowing them to generate, exchange, and consume data with minimal human intervention.
Blog
IAM: Identity and Access Management
21.07.2023
For a company, maintaining the necessary flow of, and managing access to, its business data calls for full attention not only from its tech department, but from the top management as well.
Blog
Failover
17.05.2023
Failover is a backup mode of operation where the functions of a primary system component, such as a processor, server, network, or database, are switched to a secondary system component when the primary one becomes unavailable, whether due to a failure or for scheduled maintenance.
Blog
DLP: Data Loss Prevention
24.04.2023
Companies tend to be very careful about keeping their confidential information, since their business continuity and their very existence often depend on it. To protect this valuable resource, they usually apply multiple tools to try and prevent outsiders or unauthorized people from accessing it.
More blogs