Buscar solución
Rohde & Schwarz ofrece productos y soluciones. Si aún no sabe qué producto es adecuado para la tarea que desea realizar, puede encontrar más información en esta sección.
Buscar solución
Rohde & Schwarz ofrece productos y soluciones. Si aún no sabe qué producto es adecuado para la tarea que desea realizar, puede encontrar más información en esta sección.
945 Resultados
Descubra nuestra oferta completa de soluciones de test de banda ultraancha para el sector automovilístico que incluyen verificación de la conformidad con los estándares del consorcio FiRa y el Car Connectivity Consortium (CCC).
Las soluciones de test y medida de Rohde & Schwarz garantizan la optimización de todos los aspectos de la conectividad 5G en automóviles. Conozca mejor nuestras soluciones de medida de 5G en el sector automovilístico.
For decades, Rohde & Schwarz has been supplying ground, air and naval forces around the world with innovative communications and intelligence systems.
Cellular Network Analysis solutions from Rohde & Schwarz enhance situational awareness for cellular networks in military operations.
Descubra la revolucionaria solución para verificar funciones de ADAS y AD en bancos de prueba «Vehicle-in-the-Loop».
Rohde & Schwarz designs, develops and delievers innovative signal intelligence solutions to get complete situational awareness.
Learn about different aspects of load pull analysis and testing. Discover a load pull measurement setup from an industry leader in load pull testing. Explore now.
Cybersecurity solutions are the prerequisite for digital transformation. We lead you into a secure networked world! Find out more.
IT security is of particular importance for operators of critical infrastructures.
IT security is of particular importance for operators of critical infrastructures.
The protection of sensitive information is subject to various legal regulations on secrecy and requires special security precautions
Soluciones de ciberseguridad, NATO RESTRICTED y EU RESTRICTED (nacional). Más información aquí.
Obtenga información sobre la Ley del Acceso Online (Onlinezugangsgesetz u OZG por sus siglas en alemán), sus desafíos, y el estado de la seguridad del individuo digital en manos de las autoridades digitales.
Soluciones de ciberseguridad, NATO RESTRICTED y EU RESTRICTED (nacional). Más información aquí.
When classified information is processed using IT systems, cybersecurity becomes directly relevant. Depending on the level of classification, authorities must take protective measures.
Communicate highly securely with smartphones and tablets - R&S Mobile Connectivity solution using Indigo combines convenient and secure working with sensitive data
Cybersecurity-Konferenz für Interessenten und Anwender Cybersecurity-Konferenz 200_58342 Cybersecurity-Konferenz für Interessenten und Anwender Cybersecurity-Konferenz Für sichere Daten in einer digitalisierten Welt Schutz vor den stetig ändernden Cyberbedrohungen zu schaffen, ist eine der großen Herausforderungen unserer Zeit. Insbesondere Behörden und Unternehmen mit besonderen Sicherheits- und Zulassungsanforderungen
Creating “Future Lab” conditions through secure, remote automatic testing on a global scale. Discover more!
La calculadora de CIDR y rango de red es la herramienta perfecta para administradores de redes, docentes y estudiantes para facilitar el direccionamiento de redes IPv4 y las notaciones CIDR.
Digital. Sovereign. Secure. For critical infrastructures and VS-NfD working environments.
Meet us at it-sa 2022 in Nuremberg and discover the latest developments in network encryption and endpoint security.
Cloud & Sécurité Cloud & Sécurité 200_45131 Cloud & Sécurité Le Yin et le Yang de la transformation numérique Depuis l’avènement du digital, les questions sur le Cloud et la cybersécurité se multiplient : 1. Dans quelle mesure le Cloud est-il un générateur de vulnérabilités et de menaces ? 2. Quels sont les défis du Cloud et quel est l’impact de celui-ci sur les besoins en cybersécurité ? 3. Plutôt
The Partner Summit 2024 is one of the most important events of the year for us - an excellent opportunity to advance our joint mission to expand digital sovereignty in Europe.
Visit us at PITS on June 12-13 in Berlin to discuss new trends and strategies in the field of IT security.
Meet us at it-sa 2023 in Nuremberg and discover the latest developments in network encryption and endpoint security.
With the phenomenal uptake in Microsoft® Teams™ usage since the lock-down, concerns about data security are also on the rise - especially for organizations with previously low cloud affinity.
Cybersecurity becomes directly relevant at the latest when processing classified information with IT systems.
The previous standard for e-mail and file encryption, Chiasmus, has been discontinued and a successor solution, VS-Desktop, is already available. But how do you integrate this solution into a VS-NfD workstation?
The IT world has changed substantially: The traditional security perimeter is proving to no longer be effective as fast-growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.
The IT world has changed substantially: The traditional security perimeter is proving to no longer be effective as fast-growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.