X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cryptographic functions


E-mail Encryption: Protecting Data in Transit
Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre

cryptographic functions  the basis of a cryptographic format analysis cannot be allowed. One, two, or even more separate e-mails are therefore sent, depending on the recipient’s email functionality. Example: Smith and Jones have S/MIME certificates Brown and Black have PGP keys “Sender” has a S/MIME certificate The standard format set is S/MIME “Sender” sends an encrypted e-mail to the recipients: 2.3. Expertise When a signed e-mail message is opened, secure mail verifies the signature. If the verification is

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module  

Start Now

Documents related to » cryptographic functions

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

cryptographic functions   Read More

Choosing a Key Management Solution


The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment.

cryptographic functions   Read More

Information Security RFI/RFP Template


Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module

cryptographic functions   Read More

CryptoSwift Takes Rainbow Revenues Up 620%


Rainbow Technologies' revenue for its Internet Performance and Security division is up 620% from last year. This increase is due primarily to revenues brought in by its CryptoSwift product line.

cryptographic functions   Read More

American Software - A Tacit Avant-Garde?


Throughout June, American Software, Inc. continued to announce additional functions that broaden the scope of its e-intelliprise application suite. It also announced financial results for fiscal 2000.

cryptographic functions   Read More

Is Your ERP System Provider a Psychopath?


Here’s an often overlooked factor in ERP software selection, and it’s got nothing to do with ERP functions or features: Personality. That’s right, personality. No, I’m not talking about the personality of your presumptive ERP systems (see also: pathetic fallacy). Nor am I talking exclusively about the personality of the ERP vendor sales reps, say, or of the software demo team.

cryptographic functions   Read More

Transportation Management System (TMS) RFI/RFP Template


System Definition and Implementation,Interface and Integration,Required Features and Functions, and Analysis

cryptographic functions   Read More

Critical Business Functions: Misunderstood, Underutilized, and Undervalued Part One: Credit and A/R Management


The credit and collection function is the most misunderstood, underutilized, and undervalued area of business. When allied with the sales function, controlled A/R can generate a significant cash inflow playing a huge role in the prospect-to-cash cycle.

cryptographic functions   Read More

Case Study: Newburgh Enlarged City School District


Schools often need to deploy computers that offer a limited feature set, as limiting a computer’s functions is important to protecting its purpose and keeping students focused. To lock down student workstation functionality, Newburgh Enlarged City School District finally implemented a solution to control system settings and application functionality. Learn more about the features and functionality of this workstation access solution.

cryptographic functions   Read More

Cost Reduction of a Product through Value Analysis and Value Engineering


Value analysis and value engineering (VAVE) is a systematic process for analyzing the functions of a project, product, process, system, design, or service in order to achieve essential functions at the lowest life cycle cost. VAVE methods are very important and useful in driving down product costs, which helps companies retain market share and sustain their profitability. Learn how.

cryptographic functions   Read More