Q2 2018 Yandex NV Earnings Call on July 26, 2018 / 12

Total Page:16

File Type:pdf, Size:1020Kb

Q2 2018 Yandex NV Earnings Call on July 26, 2018 / 12 THOMSON REUTERS STREETEVENTS PRELIMINARY TRANSCRIPT YNDX - Q2 2018 Yandex NV Earnings Call EVENT DATE/TIME: JULY 26, 2018 / 12:00PM GMT THOMSON REUTERS STREETEVENTS | www.streetevents.com | Contact Us ©2018 Thomson Reuters. All rights reserved. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is prohibited without the prior written consent of Thomson Reuters. 'Thomson Reuters' and the Thomson Reuters logo are registered trademarks of Thomson Reuters and its affiliated companies. PRELIMINARY JULY 26, 2018 / 12:00PM, YNDX - Q2 2018 Yandex NV Earnings Call CORPORATE PARTICIPANTS Gregory Abovsky Yandex N.V. - COO & CFO Katya Zhukova Mikhail Parakhin Yandex LLC - CTO CONFERENCE CALL PARTICIPANTS Alexander Vengranovich Sova Capital Limited, Research Division - Research Analyst Cesar Adrian Tiron BofA Merrill Lynch, Research Division - Research Analyst Lloyd Wharton Walmsley Deutsche Bank AG, Research Division - Research Analyst Miriam Anuoluwapo Adisa Morgan Stanley, Research Division - Equity Analyst Mitch Mitchell BCS Financial Group, Research Division - Media and Industrials Senior Analyst Slava Degtyarev Svetlana Sukhanova Sberbank CIB Investment Research - Senior Analyst Ulyana Lenvalskaya UBS Investment Bank, Research Division - Director and Analyst of Media and Technology Vladimir Bespalov VTB Capital, Research Division - Analyst of Industrials, Transportation, Infrastructure, Chemicals & Equities and Internet Analyst PRESENTATION Operator Good day, and welcome to the Yandex Second Quarter 2018 Financial Results Conference Call. Today's conference is being recorded. At this time, I would like to turn the conference over to Katya Zhukova, Investor Relations Director. Please go ahead. Katya Zhukova Hello, everyone, and welcome to Yandex' Second Quarter 2018 Earnings Call. We distributed our earnings release earlier today. You can find a copy of the press release on our IR website and on Newswire services. On the call today, we have Greg Abovsky, our Chief Operating Officer and Chief Financial Officer; and Mikhail Parakhin, our Chief Technology Officer. Arkady Volozh, our Chief Executive Officer; and Vadim Marchuk, our VP of Corporate Development will be available on the Q&A session. The call will be recorded. The recording will be available on our IR website in a few hours. As usual, we prepared a few supplementary slides, which are currently available on our IR website. Now I will quickly walk you through the safe harbor statement. Various remarks that we make during this call about our future expectations, plans and prospects constitute forward-looking statements. Our actual results may differ materially from those indicated or suggested by these forward-looking statements as a result of various important factors, including those discussed in the Risk Factors section of our Annual Report on Form 20-F dated March 27, 2018, which is on file with the SEC and is available online. In addition, any forward-looking statements represent our views only as of today and should not be relied upon as representing our views as of any subsequent date. Although, we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so, even if our views change. Therefore, you should not rely on those forward-looking statements as representing our views as of any date subsequent to today. 2 THOMSON REUTERS STREETEVENTS | www.streetevents.com | Contact Us ©2018 Thomson Reuters. All rights reserved. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is prohibited without the prior written consent of Thomson Reuters. 'Thomson Reuters' and the Thomson Reuters logo are registered trademarks of Thomson Reuters and its affiliated companies. PRELIMINARY JULY 26, 2018 / 12:00PM, YNDX - Q2 2018 Yandex NV Earnings Call During this call, we'll be referring to certain non-GAAP financial measures. These non-GAAP financial measures are not prepared in accordance to the U.S. GAAP. A reconciliation of the non-GAAP financial measures to the most directly comparable GAAP measures is provided in the earnings release we issued today. And now, I'm turning the call over to Mikhail Parakhin. Mikhail Parakhin - Yandex LLC - CTO Thank you, Katya, and hello, everyone. I'm delighted with our accomplishments in Q2. Our consolidated revenue grew 34% year-on-year, reaching RUB 29.7 billion. Revenue growth was primarily driven by the solid growth on Yandex properties, accounting for the bulk of our revenue as well as by great across Taxi, Classifieds, Media Services and Experiments. On April 27, we completed the formation of Yandex.Market JV with Sberbank and deconsolidated Yandex.Market from our consolidated numbers. From a reporting perspective, this in use our consolidated revenue growth has Q2 2018, we report only 27 days of Yandex.Market results versus full quarter of Yandex.Market in Q2 2017. Excluding the impact of Yandex.Market from 2017 and 2018, our revenues in Q2 grew 39% year-over-year. Revenues of Yandex properties grew 21% year-over-year. Excluding Yandex.Market, revenues of Yandex properties grew 28% year-over-year. This is compared with 24% growth on the X Yandex.Market basis in Q1 this year. The acceleration was driven by solid trends in Search and across our other properties with then images and homepage as main contributors to growth. Growth in our core search product were driven by a number of factors, primarily by games in Android and our advancements on the front. The new approach to auction that we unveiled in late April as part of our launch was well adopted by advertisers. We continued experimenting with different layouts and within organic search results. We see encouraging trends in mobile monetization as a result of some of these -- In June, we started experimenting with placement of Yandex.Direct on our homepage. The experiment combined sufficient targeting capabilities of Yandex.Direct with an extensive research provided by Yandex homepage, one of the largest online advertising on the Internet. Currently, we're in this experiment on a limited audience size and we're seeing encouraging results. On the Ad Network front, we continue seeing the adverse impact from the change of our partner mix that I mentioned in April. In Q2, it was not fully offset by the positive impact of our new partnerships. Revenues of Yandex Ad Network grew 4% year-over-year this quarter. Turning to our search share trends. In June, our overall search share reached 55.5%, up 120 basis points compared to the year-ago. Our search share and desktop averaged 65.9% in June, gaining 160 bips from June 2017, but down 160 bips from March 2018 due to regular seasonality and the adverse impact of the road cap on our desktop searches. On mobile, our search share hit new heights at 46.2%, growing 540 bips year-over-year. On Android, our search share averaged 48% in June. This is an increase of 120 bips from March 2018 and 80 bips up year-over-year. On the past 4 weeks, our share on Android reached 48.6%. Our search share on iOS was 39.4% in June, up 19 bps compared to March 2018, but slightly down from a year ago. Share of mobile traffic reached 45% of our total search traffic in Q2. Mobile revenues represented 35% our research revenues. Mobile platforms remained the key driver of our search increase driven by growth of our mobile share and the adoption for Alice, our intelligent voice assistant. Alice continues to drive user engagement and loyalty. In Q2, its number of skills significantly increased 10,000. This growth was driven by Yandex dialogues, our platform for third-party developers, allowing to integrate third-party skills quickly and easily. In share of voice search traffic in our search app grew from single-digit to 18%, while our search app audience had doubled. We strongly believe that voice is a key element to connect the online and the off-line worlds. Alice is currently available in Yandex.Browser, Yandex.Search app, navigator and Yandex.Station, our smart that we recently. Yandex.Station is on board, assist people in their homes, managing daily routine tests. This is the first smart speaker developed for the Russian market. We see a strong interest in Yandex.Station. We sold out our first batch during the first day. Now everyone can order Yandex.Station on Yandex.Market and -- the price is RUB 9,990, which is approximately USD 160. Yandex.Plus is another new product that we unveiled in Q2. It is our subscription-based membership program that currently provides access to bundle of Yandex services. The subscription monthly fees below $8, but it offers number of nice benefits, unlimited music streaming on Yandex.Music, free moves on KinoPoisk, discounts for Yandex.Taxi and Yandex.Drive rights, predelivery for the users and additional storage space on Yandex disk. Yandex.Plus provides its subscribers with benefits of using their favorite products and give them opportunity to discover new ways like Yandex services can help them. I'm excited for the speed of new product launches that we demonstrated recently. With this, I'm turning the microphone over to Greg, who will walk you through the operational performance of business units and our financials. Gregory Abovsky - Yandex N.V. - COO & CFO Thank you, Mikhail, and thank you all for joining our call today. In Q2, we delivered another strong set of results. Our consolidated revenue grew 34% year-on-year, reaching RUB 29.7 billion. Online advertising revenues accounted for 83% of total revenues in Q2 and increased 17% year-on-year. 3 THOMSON REUTERS STREETEVENTS | www.streetevents.com | Contact Us ©2018 Thomson Reuters. All rights reserved. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is prohibited without the prior written consent of Thomson Reuters.
Recommended publications
  • Russia Technology Internet Local Dominance Strengthens
    12 December 2018 | 1:51AM MSK Russia Technology: Internet Local dominance strengthens; competition among ecosystems intensifies It’s been a year since we published Russia’s internet champions positioned to Vyacheslav Degtyarev +7(495)645-4010 | keep US giants at bay. We revisit our thesis, highlighting that the domestic internet [email protected] OOO Goldman Sachs Bank incumbents are successfully defending their home turf from international competition. We have seen only modest incremental efforts from global players, with some recognizing the importance of local expertise (Alibaba’s agreement to transfer control in AliExpress Russia to local partners) or conceding to domestic market leaders (Uber merged its Russian operations with Yandex.Taxi, citing Yandex’s strong technology and brand advantage). The two domestic market leaders, Yandex and Mail.ru, have solidified their dominant positions in search and social networks, respectively, and are leveraging these core businesses to exploit new sources of growth across their ecosystems (e.g. advertising, taxi, food tech, music). While their ever-expanding competitive overlap is worrying, we note this is not unique for global tech and is still relatively limited in scale. We expect the local dominance trend to continue and see significant untapped opportunities in e-commerce, messengers, local services, cloud and fintech. We re-iterate our Buy ratings on Yandex (on CEEMEA FL) and Mail.ru, and view them as the key beneficiaries of internet sector growth in Russia. We believe the market
    [Show full text]
  • Sobre La Seguridad Del Almacenamiento En La Nube
    SOBRE LA SEGURIDAD DEL ALMACENAMIENTO EN LA NUBE Máster interuniversitario de Seguridad de las tecnologías de la información y de las comunicaciones Autor: Andrés Galmés Hernández Directora: María Francisca Hinarejos Campos Universitat Oberta de Catalunya Enero de 2016 Esta obra está sujeta a una licencia Reconocimiento- NoComercial-SinObraDerivada 3.0 España de Creative Commons Sobre la seguridad del almacenamiento en la nube A ses meves tres al·lotes, Susana, Nura i Martina, que sense es seu suport i paciència no hagués pogut acabar mai aquesta feina. Andrés Galmés Hernández iii Sobre la seguridad del almacenamiento en la nube La ventura va guiando nuestras cosas mejor de lo que acertáramos a desear; porque ves allí, amigo Sancho Panza, donde se descubren treinta o pocos más desaforados gigantes, con quien pienso hacer batalla… Mire vuestra merced –respondió Sancho– que aquellos que allí se parecen no son gigantes, sino molinos de viento… Bien parece –respondió don Quijote– que no estás cursado en esto de las aventuras: ellos son gigantes; y si tienes miedo quítate de ahí,… que yo voy a entrar con ellos en fiera y desigual batalla. Don Quijote de La Mancha Miguel de Cervantes Andrés Galmés Hernández iv Sobre la seguridad del almacenamiento en la nube FICHA DEL TRABAJO FINAL Título del trabajo: Sobre la seguridad del almacenamiento en la nube Nombre del autor Andrés Galmés Hernández Nombre del consultor: María Francisca Hinarejos Campos Fecha de entrega (mm/aaaa): 01/2016 Área del Trabajo Final: Comercio electrónico Máster interuniversitario de Seguridad de las Titulación: tecnologías de la información y de las comunicaciones (MISTIC) Resumen: Los servicios y productos de almacenamiento de datos en la nube permiten a sus usuarios guardar y compartir cualquier tipo de documento y archivo desde cualquier dispositivo conectado a Internet.
    [Show full text]
  • Yandex : Un Système Tentaculaire
    SOMMAIRE Sommaire ................................................................................................................................................ 2 Executive summary ................................................................................................................................. 3 Introduction ............................................................................................................................................. 4 I. La genèse de Yandex : un système tentaculaire ............................................................................. 8 A. État des lieux et historique du développement des filiales ........................................................ 8 1. Multiplicité et disparité entre les branches ........................................................................ 8 2. Une capacité d’expérimentation comme source d’expansion .......................................... 11 B. Le projet de diversification de Yandex ...................................................................................... 11 1. Le lancement de nouvelles filiales ..................................................................................... 11 2. Les effets de la Covid-19 comme catalyseur des filières numériques............................... 13 C. La nébuleuse Yandex : capitalisation, actionnariat, gouvernance et partenariats ................... 15 1. Capitalisation et résultats financiers ................................................................................. 15 2. La stratégie
    [Show full text]
  • Overview of Evisort's Intelligent Contract Management Platform
    STANDARD FEATURES AND PROVISIONS Evisort’s Intelligent Contract Management Platform delivers AI-powered, end-to-end CLM capabilities that can be implemented in less that 30 days because Evisort supports 238 contract types and 64 contract fields and provisions out-of-the-box. Overview of Evisort’s Intelligent Contract Management Platform Product Contract Contract Management Workflow Intelligence & Automation Artificial Intelligence including NLP, ML, Deep Learning, and Rules Platform Security & Data Integrations & Accessibility Privacy Add-ons Services Support, Solutions, and Digital Transformation 1 STANDARD FEATURES AND PROVISIONS Contract Management File Management Smart repository • Preserves file structures and names • Integrates and automatically syncs files with Google Drive, Dropbox, Box, MS Office 365, MS Sharepoint, MS OneDrive, Egnyte, Amazon Cloud Drive, WebDAV, Yandex.Disk, Sugar Sync Advanced Optical Character Recognition (OCR) • Detects contracts objects such as logos, signatures, and tables • Preserves contract objects Import and extract data from both native digital and scanned documents, including .doc/.docx and PDF File upload • Manual • Email intake, including auto-import from scanner Automatic duplicate file detection, identification, and intelligent change management Document Analysis Artificial Intelligence • Pre-trained on 238 contract types, including buy-side, sell-side, and general agreements • Process any organization’s paper, including third-party • Metadata extraction: pre-trained on 27 contract fields • Clause
    [Show full text]
  • Cloud Adoption & Risk in Government Report
    CLOUD ADOPTION & RISK IN GOVERMENT REPORT Q1 2015 Published Q2 2015 1 TABLE OF CONTENTS 01 INTRODUCTION 02 OVERVIEW OF CLOUD ADOPTION AND RISK 04 CALCULATED RISK 06 COMPROMISED IDENTITIES 08 PERCEPTION VS. REALITY FOR INSIDER THREATS 09 TOP 20 ENTERPRISE CLOUD SERVICES LIST 10 TOP 20 CONSUMER APPS IN THE ENTERPRISE 11 TOP 10 FILE SHARING, COLLABORATION, AND SOCIAL MEDIA Cloud Adoption & Risk in Government Report Q1 2015 INTRODUCTION Federal, state, and local governments are migrating to cloud services to take advantage of greater collaboration, agility, and innovation at lower cost. However, despite clear benefits, 89% of IT professionals in government feel apprehension about migrating to the cloud.1 That being said, many public sector employees are less apprehensive and are adopting cloud services on their own, creating shadow IT. Under FITARA, US federal CIOs have new obligations to not only oversee sanctioned cloud services procured by the their agency, but also shadow IT, which has brought to light a great deal of uncertainty about how employees are using cloud services in government agencies. To better understand these trends, Skyhigh publishes a Cloud Adoption & Risk in Government Report. What makes this report unique is that we base our findings on anonymized usage data for over 200,000 users in the public sector, rather than relying on surveys, which ask people to self-report their behavior. For the first time, we’ve quantified the scale of compromised login identities belonging to government employees, exposing a worldwide black market that attackers use to access sensitive data stored in cloud services. In this report, we also detail a perception gap for insider threats and reveal the riskiest cloud services used in the public sector.
    [Show full text]
  • Full-Text (PDF)
    Vol. 10(14), pp. 2043-2050, 23 July, 2015 DOI: 10.5897/ERR2015.2297 Article Number: 6B548DF54295 Educational Research and Reviews ISSN 1990-3839 Copyright © 2015 Author(s) retain the copyright of this article http://www.academicjournals.org/ERR Full Length Research Paper Computer education and instructional technology teacher trainees’ opinions about cloud computing technology Ay şen Karamete Balikesir University, Necatibey Education Faculty, Department of Computer Education and Instructional Technology, Turkey. Received 15 May, 2015; Accepted 13 July, 2015 This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees participated in the study. The aim of this qualitative study was to determine trends about cloud technology. The cloud technology under study included “Dropbox”, “SpiderOak”, “Google Drive”, “IDrive”, “pCloud”, “OpenDrive”, “Bitcasa”, “OneDrive”, “Tresorit”, “Box” and “Yandex.Disk. The CEIT teacher trainees’ opinions about cloud storage and its purposes; their opinions about types of cloud storage and the level of importance of cloud storage were investigated. The reliability and validity were taken. The advantages and disadvantages of cloud computing were examined. The study found that CEIT teacher trainees’ had used cloud storages such as Dropbox
    [Show full text]
  • Is It Recommended to Pay for Icloud
    Is It Recommended To Pay For Icloud unobeyedAliform Lester and neverMelbourne. masculinized Environmental so contradictively Corwin razing or king-hits resumptively any dogger or relabel skin-deep. solenoidally Encircling when Abbie Gifford forsakings is antipapal. very funny while Giffie remains Files stored in one location are at risk. PCs, tablets, and mobile devices. Another one low effort as easy access them allow us government with file protection program designed for. Which appear better Dropbox or iCloud? What top Cloud Storage? Mac App Store is a service mark of Apple Inc. How direct Buy iCloud Storage Space On iOS Mac Windows. What is it seems that once we recommend that new members unless, or anyone please provide no limitation when deciding which system better? How does Free up Storage on iCloud Techlicious. Restoring from a backup is possible with DEP devices. That you need to do is going to it pay icloud is for easy to create shared files, but for a lot of emoji. We have many articles on good cloud storage solutions that will help you learn more about this. PC when logging on detention the integration is adult as smooth. Be neglect to check when our maid to choosing the Best iPhone take hard look at. He lives in Scotland. It still actually make quick sense for multiple company made you think. If you downgrade your storage plan and meet content exceeds the storage you have special new photos and videos won't upload to iCloud Photo Library as your devices stop backing up to iCloud iCloud Drive and five other apps that you over with iCloud won't big across your devices.
    [Show full text]
  • Prospects of Employment of Artificial Intelligence in Propaganda
    АКТУАЛЬНЫЕ ПРОБЛЕМЫ МЕЖДУНАРОДНЫХ ОТНОШЕНИЙ Article PROSPECTS OF EMPLOYMENT OF ARTIFICIAL INTELLIGENCE IN PROPAGANDA. SINGULARITY OF PROPAGANDA Mikhail Koshmarov* DOI 10.24833/2073-8420-2019-4-53-92-99 Introduction. The object of study is the modern society in a wide, common to all mankind sense. The subject of the study are technologies of artificial neuronic net- works. The aim of the study is analysis and forecast of application of artificial intellect in short- and long-term perspective of the development of the society. Materials and methods. The methodological basis of the study are traditional scientific methods applied in political sciences and economic sciences, combined with new terminology, in order to describe contemporary phenomena – analysis, synthesis, historical method and others. Research result. The article studies possible perspectives of development of exist- ing technologies of artificial neuronets (artificial intelligence) and its application to the production of public consent. The analyzed possibilities of these technologies when applied to the optimization of production, include economy of resources, solution of ecological problems, and national security in the context of terrorism threat. The possi- bilities of the use of the artificial intelligence technologies by the world leading govern- ments are also studied. The article presents a study of the contemporary application of technologies of artificial intellect and an analysis of perspectives of their application in future together with analysis of the risks of the use of new technologies in the context of the threat of terrorism. Discussion and Conclusion. The concept of infocapsule and the technology of its creation are described. The research of the phenomenon of the singularity of propa- ganda presented in the article allows to extrapolate the obtained results to the contem- porary trends of the evolution of the society.
    [Show full text]
  • Diplomová Práce
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ Fakulta elektrotechniky a komunikačních technologií DIPLOMOVÁ PRÁCE Brno, 2017 Bc. Ivan Chernikau VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA ELEKTROTECHNIKY A KOMUNIKAČNÍCH TECHNOLOGIÍ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION ÚSTAV TELEKOMUNIKACÍ DEPARTMENT OF TELECOMMUNICATIONS OCHRANA SOUKROMÍ V CLOUDU PRIVACY PROTECTION IN CLOUD DIPLOMOVÁ PRÁCE MASTER'S THESIS AUTOR PRÁCE Bc. Ivan Chernikau AUTHOR VEDOUCÍ PRÁCE Ing. Petr Dzurenda SUPERVISOR BRNO 2017 1 Diplomová práce magisterský navazující studijní obor Telekomunikační a informační technika Ústav telekomunikací Student: Bc. Ivan Chernikau ID: 146017 Ročník: 2 Akademický rok: 2016/17 NÁZEV TÉMATU: Ochrana soukromí v cloudu POKYNY PRO VYPRACOVÁNÍ: V rámci diplomové práce student provede základní srovnání současných technik pro zajištění ochrany soukromí uživatelských dat v prostředí cloudu, jako je plně homomorfní šifrování (full homomorphic encryption), dělení dat (data splitting) a vyhledávatelné šifrování (searchable encryption). Na základě této analýzy student vybere vhodný protokol poskytující ochranu soukromí uživatelských dat v cloudu a implementuje jej do funkčního systému. DOPORUČENÁ LITERATURA: [1] DZURENDA, P.; HAJNÝ, J. Techniky homomorfního šifrování a jejich praktické využití. Elektrorevue Internetový časopis (http://www.elektrorevue.cz), 2014, roč. 16, č. 2, s. 54-60. ISSN: 1213- 1539. [2] CALVIÑO, Aida; RICCI, Sara; DOMINGO-FERRER, Josep. Privacy-preserving distributed statisticalcomputation to a semi-honest
    [Show full text]
  • Building a First Aid Kit for Data Breaches 06
    Summer 2018 (vol. 12 issue 3) | www.csae.org EXCELLENCE BY ASSOCIATION BUILDING A FIRST AID KIT FOR DATA BREACHES 06 10 AI IN YOUR FUTURE Colorado 12 BACKING UP YOUR DATA Society of Association 22 SPOTLIGHT: ALEXANDRA MERRICK Executives TAKE YOUR ASSOCIATION TO NEW HEIGHTS. Book by December 31, 2018 and choose your reward. 50 - 150 Room Nights Choose One Reward 151 - 250 Room Nights Choose Two Rewards 251 - 350 Room Nights Choose Three Rewards 351 - 450 Room Nights Choose Four Rewards BOOK JUST ONE MEETING AND MAXIMIZE YOUR REWARDS BY BOOKING TWO RECEIVE GREAT REWARDS* OR MORE MEETINGS THROUGH 2025* • 3% credit to master on actualized room revenue • 5% credit to master on actualized room revenue • 5% discount on F&B • 10% discount on F&B • 1 per 45 lodging rooms comped • 1 per 35 lodging rooms comped • 25% off resort fee • 50% off resort fee • 3 Complimentary round trip airport transfers • 5 Complimentary round trip airport transfers • Complimentary WiFi in meeting space • Complimentary WiFi in meeting space • Complimentary one-night-stay gift certificate • Complimentary two-night-stay gift certificate • Complimentary catered happy hour or coffee break • Complimentary catered happy hour or coffee break • Complimentary board meeting with F&B break • Complimentary board meeting with F&B break for up to 12 people for up to 12 people • Complimentary one-hour yoga class per guest • Complimentary one-hour yoga class per guest Visit vailresortsmeetings.com/associationpromotion to learn more VAILRESORTSMEETINGS.COM | 970.496.6557 | [email protected] VAIL | BEAVER CREEK | WHISTLER | BRECKENRIDGE PARK CITY | KEYSTONE | LAKE TAHOE | JACKSON HOLE MEETINGS & EVENTS *Offer valid for bookings contracted through December 31, 2018.
    [Show full text]
  • Pobierz Folder
    Hyprovision DLP – skuteczny system klasy DLP Hyprovision DLP to profesjonalne rozwiązanie DLP (Data Loss Prevention), które oferuje szerokie możliwości ochrony przed przypadkowym lub celowym wyciekiem danych, które mogą trafić w niepowołane ręce poprzez użycie przenośnych pamięci USB (pendrive), dysków twardych, wydruku, transferu za pośrednictwem poczty e-mail, komunikatorów internetowych, formularzy na stronach internetowych, korzystania z aplikacji oraz usług w chmurze. Hyprovision DLP umożliwia zdefiniowanie polityk bezpieczeństwa (metod ochrony), które wpięte w reguły (gdzie, kto oraz kiedy) monitorują, wykrywają oraz blokują nieautoryzowany przepływ informacji. KLUCZOWE CECHY Monitorowanie i kontrola danych chronionych, podejmowanie decyzji czy dane mogą opuścić organizację Ochrona treści wybranymi kanałami, urządzeniami oraz w wyniku działania poszczególnych użytkowników. Automatyczne wyszukiwanie i identyfikacja treści wymagających ochrony na komputerach lokalnych, Klasyfikacja treści serwerach, macierzach dyskowych. Identyfikacja może odbywać się w locie (dla danych w użyciu) oraz zgodnie z zaplanowanym harmonogramem. Znakowanie dokumentów (fingerprint) Automatycznie nadawanie niewidocznych znaczników na dokumenty w oparciu o zdefiniowane reguły. Kontrola urządzeń Monitorowanie i kontrola USB oraz portów peryferyjnych. Ustanawianie praw dla urządzeń i użytkowników. Automatyczne wymuszanie szyfrowania danych kopiowanych na napędy USB oraz napędy udostępnione, Wymuszanie szyfrowania z zastosowaniem szyfrowania AES 256 bit. Jak działa Hyprovision DLP? SIEĆ KORPORACYJNA CENTRALA PRACOWNIK W DELEGACJI INTERNET PRACA ZDALNA SERWER VPN ODDZIAŁ REGUŁY ALERTY / LOGI ALERTY KONSOLA ADMINISTRATORA www.hyprovision.com KONTROLOWANE OCHRONA PORTÓW IDENTYFIKOWANE TYPY URZĄDZEŃ FORMATY PLIKÓW Y USB Y Napędy dyskietek Y MS Office, OpenOffice, Lotus Y FireWire 1-2-3, CSV, TXT, DBF, XML, Y Napędy CD/DVD/BD Y Podczerwień Unicode Y Dyski wymienne: nośniki flash, Y Szeregowe i równoległe Y pliki MIME karty pamięci, pendrive itd.
    [Show full text]
  • Applications: Y
    Applications: Y This chapter contains the following sections: • Y8, on page 3 • Yabuka, on page 4 • Yahoo!, on page 5 • Yahoo! Accounts, on page 6 • Yahoo! Box, on page 7 • Yahoo! Box Download, on page 8 • Yahoo! Box Upload, on page 9 • Yahoo! Calendar, on page 10 • Yahoo! Douga, on page 11 • Yahoo! Finance, on page 12 • Yahoo! Flash, on page 13 • Yahoo! Games, on page 14 • Yahoo! Mail, on page 15 • Yahoo! Messenger, on page 16 • Yahoo! Messenger Audio, on page 17 • Yahoo! Messenger Chat, on page 18 • Yahoo! Messenger SMS, on page 19 • Yahoo! Messenger Video, on page 20 • Yahoo! Mobage, on page 21 • Yahoo! MP4, on page 22 • Yahoo! Shockwave, on page 23 • Yahoo! Slurp, on page 24 • Yahoo! Toolbar, on page 25 • Yahoo! Video, on page 26 • Yahoo! Voice, on page 27 • Yammer, on page 28 • Yandex, on page 29 • Yandex AppMetrica, on page 30 • Yandex Bot, on page 31 • Yandex Disk, on page 32 • Yandex Email, on page 33 • Yandex Images, on page 34 Applications: Y 1 Applications: Y • Yandex Maps, on page 35 • Yandex Market, on page 36 • Yandex Money, on page 37 • Yandex Music, on page 38 • Yandex Translate, on page 39 • Yandex Video, on page 40 • Ybrant Digital, on page 41 • Yellow Pages, on page 42 • Yelp, on page 43 • Yemonisoni, on page 44 • Yesky, on page 45 • Yet ABC, on page 46 • Yeti Bot, on page 47 • yfrog, on page 48 • Yieldmanager, on page 49 • Yik Yak, on page 50 • YiXin, on page 51 • Yle Areena, on page 52 • YNews, on page 53 • Youdao Dictionary, on page 54 • Youjizz, on page 55 • Youku, on page 56 • Youm7, on page 57 • YouPorn, on page 58 • YouPornGay, on page 59 • Youth.cn, on page 60 • YouTube, on page 61 • Youtube Upload, on page 62 • YouTubeMp3, on page 63 • YY, on page 64 Applications: Y 2 Applications: Y Y8 Y8 Description Internet gaming website.
    [Show full text]