Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.
: IBM Firewall Discontinued IBM Firewall Discontinued L. Taylor - March 13, 2000 Read Comments Event Summary In February, IBM announced that as of the end of this year, it will cease to market the AS/400 add-on Firewall product, and as of May 31, 2001, it will cease to support it. Citing increased competition, and focus on other products as a priority, IBM said that there are enough alternative firewall products on the market for IBM customers. Many of these products provide a superior solution for AS/400
Your Challenge: Get Decision Makers' Approval for NetBIOS Firewall - Preventive Technologies for a Secure Future. Specific, Measurable, Achievable, Relevant and Time-Bound. How many times do you hear network administrators scream at the top of their voice,
: | dmz firewall | dns firewall | enterprise network security | enterprise security | enterprise security management | fire wall | firewall antivirus | firewall appliance | firewall config | firewall configuration | firewall connection | firewall download | firewall forward | firewall network security | firewall port | firewall ports | firewall security | firewall server | firewall settings | firewall setup | firewall software | firewall software best | firewall tunnel | firewall vpn client | free download
9/6/2005 1:25:00 PM
Firewall for Beginners
Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution.
: Firewall for Beginners Firewall for Beginners Source: Wipro Technologies Document Type: White Paper Description: Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution. Firewall for Beginners style= border-width:0px; /> comments powered by Disqus Related Topics: Security, Firewall Source: Wipro Technologies Learn more about Wipro Technologies Readers who downloaded this white paper also read these popular
7/30/2008 6:02:00 AM
Check Point Leads Firewall Market
With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.
: Check Point Leads Firewall Market Check Point Leads Firewall Market L. Taylor - July 25, 2000 Read Comments L. Taylor - July 25, 2000 Vendor Genesis Israeli based Check Point Software Technologies, Ltd., headquartered on the outskirts of Tel Aviv, was founded in 1993. On June 28, 1996, Check Point launched its IPO on NASDAQ under ticker symbol CHKPF. On March 3, 1999, they changed their ticker symbol to CHKP. Check Point s founder, Chairman, President, and CEO, Gil Shwed developed his security skills
CyberPeepers from Korean Sites Peek at U.S. Networks
Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom you ask, and how far into your infrastructure they get.
: thinking it is a DNS response. Often attackers come from source port 53 in order to penetrate firewalls that are known as stateless. If you have what is known as a stateless firewall, check your logfiles for incident traces from the .kr country domain. Security Incidents can be reported to either Sans or CERT who track, and in some cases, identify sources of attacks. User Recommendations What can your organization do to protect itself from Cyberpeepers from Korea or anywhere else? 1. Put in a stateful
Are You Adequately Protecting Your IT Infrastructure Components Inside the Firewall?
Components such as applications, databases, web servers, directories, and operating systems rely mostly on built-in security features. But passwords and privileges are hardly enough, considering that many users have elevated privileges and fail to follow established corporate procedures.
: IT security, IT infrastructure, IT policy enforcement, security compliance, change management systems, change validation, security policies, security features, network access controls, database management.
Small and Medium Businesses: The Threat Landscape and the Plan of Action
The threats faced by small to medium businesses (SMBs) are multidimensional and must be handled differently from big enterprises, given the smaller number of personnel dedicated to look after them. The ideal security software for SMBs looking to protect their information systems would be the combination of antivirus, antispam, and content security solutions, combined with a powerful network firewall. Find out why it works.
11/23/2007 4:48:00 AM
With Record Revenues, AXENT Puts Down a Solid Fist
Cybercrime and information security attacks are not going to go away. AXENT's three protection products, Intruder Alert, Raptor Firewall, and NetProwler contain the most fundamental security protection products that any aspiring Internet company should include in their IT strategy - network based intrusion detection, host based intrusion detection, and an enterprise hybrid firewall.
: With Record Revenues, AXENT Puts Down a Solid Fist With Record Revenues, AXENT Puts Down a Solid Fist L. Taylor - July 6, 2000 Read Comments L. Taylor - July 6, 2000 Vendor Genesis Rockville, Maryland based AXENT Technologies Inc. has been seeing steady increases in revenue and solid sales in its line of security products for the last several years. Growing at a rate of 45% in 1998, AXENT exceeded $100 million in revenue. In 1999, their total net revenue exceeded $112 million. AXENT develops, licenses,
Five Things You Must Know When Selecting an Internet Content Filter
Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution.
: Five Things You Must Know When Selecting an Internet Content Filter Five Things You Must Know When Selecting an Internet Content Filter Source: KDI Document Type: White Paper Description: Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors
11/11/2009 11:21:00 PM
Overnight Success: Helping Small and Mid-Sized Businesses Prepare for Sudden Spikes in Online Traffic and Sales
Just to survive, let alone thrive, smaller businesses need a complete Web infrastructure that is stable, scalable, and secure. And it begins at the very first point of contact between vendor and customer: DNS, or Domain Name System. This white paper examines how managed solutions for external DNS can combat Web site crashes, distributed denial of service (DDoS) attacks, and plain old downtime.
: managed solutions for external DNS can combat Web site crashes, distributed denial of service (DDoS) attacks, and plain old downtime. Overnight Success: Helping Small and Mid-Sized Businesses Prepare for Sudden Spikes in Online Traffic and Sales style= border-width:0px; /> comments powered by Disqus Related Topics: E-commerce, Domain Name Service (DNS) Servers, Outage Reporting, Web Server Management, Web Site Monitoring, 1 to 25 employees, 26 to 50 employees, 101 to 250
4/22/2011 12:16:00 PM
: Stonylake Solutions, formed in 2000 by Robert Blair and Pradeep Pathade of Nevada Learning Series, is a global provider of firewall analysis and reporting software known as InsideOut Firewall Reporter.
White Paper Newsletters