Among the most useful dynamic elements that Fortuna features there’s the Post Carousel element that is responsive, draggable and fully customizable. Carousel any post type with it, pick from various item style presets (different box styles, date styles, customize what elemends to display), pick custom hover image effects (4 Presets to choose from), Arrow navigation position, additional dot navigation management, how many items are in the viewport, scroll speed, custom query for the items etc. Combine the different options and you get a virtually unlimited possible Post Carousel appearance setups. Check out some of the most useful Post Carousel options below as well as a few examples further below them.
Features
Post Carousel
12 Common Pitfalls in EDRM implementation
There are many factors to consider for a successful EDRM implementation. Hasty decisions, improper planning, and ...
Read moreHALOCAD for AUTODESK LIVE Now Available in the Microsoft Azure Marketplace
Microsoft Azure customers worldwide now gain access to SECUDE’s HALOCAD to take advantage of the scalability, ...
Read moreHow to Maximize your Microsoft Purview Information Protection Investment
Microsoft 365 E5 combines best-in-class productivity apps with advanced security, compliance, voice, and analytical ...
Read moreThe role of the DPO just got bigger and more powerful
The proposed Personal Data Protection (PDP) bill, mandates appointment of a Data Protection Officer (DPO). The role of ...
Read moreAre CISOs Prepared to manage today’s security threat and achieve digital resilience?
As organisations embark on digital transformation journey, the CISOs role will expand and may even elevate in taking ...
Read moreSECUDE Security Bulletin on SpringShell vulnerability
Spring4Shell is a server security vulnerability in the Spring Framework. Spring4Shell exposes an application to remote ...
Read moreThe 10 Essential Checklist for a Successful EDRM Implementation
Many EDRM projects fail miserably due to poor planning and implementation. Here are the 10 essential checklist for a ...
Read moreAdjusting to New Cybersecurity Regulations in 2022
Cybersecurity is a leading concern for businesses in 2022. Here’s a closer look at how cybersecurity regulations ...
Read moreHow SecurityBridge & SECUDE offer additional layer of Data Security for SAP data
How to protect SAP data, outside of SAP? SECUDE HALOCORE provides automated integration of MIP into SAP environments. ...
Read morePost Carousel
November 2021 Roundup – Latest News, Trends & Updates in Data Centric Security
November 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric Security. ...
Read moreSECUDE appoints Andreas Opfer as new sales head for Europe, Middle East & Asia; Streamlines organization structure in sync with market outreach plans
SECUDE announced the appointment of Mr. Andreas Opfer as Managing Director and Head of Sales for ...
Read moreThe foundational pillars of Zero Trust Strategy and how it enables you to secure organization’s crown jewels
Orchestrating endpoint visibility, authentication, and security enforcement controls are paramount ...
Read moreFive SAP data protection scenarios where HALOCORE must be considered
An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ...
Read moreBeef up your IP Security with Zero Trust – 5 Guiding Principles to protect your IP effectively
Zero Trust is the new Buzz word in the cyber security arena. Ever since, Forrester Analyst, ...
Read moreData exports – The big security risk
Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft ...
Read morePost Carousel
Controlling user downloads and API data flow in SAP® software: SECUDE & Microsoft explain how at SAPPHIRE NOW®
SECUDE will participate at SAPPHIRE NOW® and ASUG Annual ...
Why you need a Zero Trust approach in the design, manufacturing, and supply chain industry?
The design, supply chain, and manufacturing industry is the ...
12 Common Pitfalls in EDRM implementation
There are many factors to consider for a successful EDRM ...
The core of digital banking is data. But how secure is the core from a meltdown?
Touching lives at every milestone. The Banking and Financial ...
How to Secure your Design IP in your PLM environment
Design-intensive organizations leverage many types of security ...
Data theft in Switzerland: One-third of companies have been victims of industrial espionage
It is a fact that no one likes to talk about. Swiss companies ...
SECUDE’s HALOCAD Enables Manufacturing and Engineering Companies to Protect Their CAD Files by Leveraging Microsoft AIP
SECUDE has developed a unique solution to protect ...
From university to industry: A few perspectives from Philipp Meier
Through this brief post, Philipp Meier, Vice President ...
Post Carousel
SECUDE Announces Integration of Autodesk Vault with Microsoft Information Protection
SECUDE, a leading data security provider specializing in data security for SAP ...
Is there Life in the Home office after Corona?
Read how the recent corona pandemic has pushed us into a forced home office and how ...
Bridging Technology Landscapes for Enhanced Data Security: A Microsoft Case Study
“HALOCORE provides effective classification and protection of sensitive data by ...
How to Maximize your Microsoft Purview Information Protection Investment
Microsoft 365 E5 combines best-in-class productivity apps with advanced security, ...
Do you need to protect your sensitive CAD files when collaborating with third-party vendors?
CAD files are the intellectual property of the manufacturing industry. Sharing ...
Why you need a Zero Trust approach in the design, manufacturing, and supply chain industry?
The design, supply chain, and manufacturing industry is the most vulnerable ...
Post Carousel
SECUDE’s HALOCAD Enables Manufacturing and Engineering Companies to Protect Their CAD Files by Leveraging Microsoft AIP
SECUDE has developed a unique solution to protect Computer-Aided Design (CAD) files. The solution, exclusively meant for engineering and ...
Read moreSix Things to do to Get Your Data Stolen
Have you taken all the steps to throw your data into the winds? If not, you should read this blog post. Leaving your data to the wolves isn’t as ...
Read moreNumber of data breaches has gone up, but data security is still not top priority
On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical picture. While on one end, the frequency of ...
Read moreHow the Ukraine-Russia Conflict Could Impact Cybersecurity
The cyber warfare of the Ukraine-Russia conflict solidifies what many security experts have been saying for years. Cybersecurity is a matter of ...
Read moreGermany’s first GDPR fine: Understanding what is important
Over a month ago the data protection authority of Baden-Württemberg imposed the first fine for violation of GDPR. This clearly means that companies' ...
Read moreHow to Maximize your Microsoft Purview Information Protection Investment
Microsoft 365 E5 combines best-in-class productivity apps with advanced security, compliance, voice, and analytical capabilities. Learn How SECUDE ...
Read morePost Carousel
SECUDE’S HALOCORE® 5.3 Now Certified for SAP S/4 HANA 1909
With this new integration, HALOCORE® 5.3 will continue to focus on delivering ...
CISA Releases New Tool to Help Organizations Prevent Insider Threats
The Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool ...
Six Reasons why Enterprise Digital Rights Management Matters for Data-Centric Security
EDRM is the core data-centric technology for protecting data in today’s ...
How to Protect your AutoCAD and Autodesk Inventor Drawings from Cyberthreats
Organizations that use AutoCAD and Autodesk Inventor have to ensure adequate ...
The Simple Printer: Innocuous Office Tool or Source of Silent Data Leak?
The innocuous office printer is a seemingly simple corporate device of everyday ...
March 2021 Roundup – Latest News, Trends & Updates in Data Centric Security
March 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric ...
The 10 Essential Checklist for a Successful EDRM Implementation
Many EDRM projects fail miserably due to poor planning and implementation. Here are ...
10 Data Leaks that have cost Fortune 500 companies a fortune
Losing data can be a painful–even disastrous– experience. Considering the ...