X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 information technology security


Information Security Firewalls Market Report Part One: Market Overview and Technology Background
The firewall market is a mature and competitive segment of the information security market. With numerous vendors and firewalls in all price ranges choose from,

information technology security  DISCLAIMER OF LIABILITY The information included on this web site, whether provided by personnel employed by Technology Evaluation (TEC), Relevant Technologies, or by third parties, is provided for research and teaching purposes only. Neither TEC, Relevant Technologies, nor any of their employees, consultants, contractors, or affiliates warrant the accuracy or completeness of the information or analyses displayed herein, and we caution all readers that inclusion of any information on this site does not

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » information technology security

Feds Buckle Down on Customer Information Security


In an effort to improve the state of consumer privacy, Federal Reserve Board, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of the Currency (OCC), and the Office of Thrift Supervision, on January last year announced that they have put together joint guidelines to safeguard confidential customer information. The guidelines, that took effect last July, implement section 501(b) of the Gramm-Leach-Bliley Act (GLBA) initiated by the Senate Banking Committee, and passed into law on November 4, 1999. This announcement had significant implications for online banking institutions.

information technology security  comply with standard best-practice information security measures. While most online banks and merchants acknowledge the importance of data security, it is often the last thing taken into consideration when architecting an online payment system. In some cases, an online payment system can consist of an intricate interconnection of networks between a bank, a managed service provider, an online merchant, and a payment processing order fulfillment organization. Making sure they all have their ducks lined up Read More

M-Tech Mercury Information Technology, Inc.


M-Tech is a computer security software and services company that develops and distributes security products to streamline password management and login account administration. M-Tech offers computer network security services such as remote penetration tests, risk analysis, development of secure applications and more.

information technology security  Tech Mercury Information Technology, Inc. M-Tech is a computer security software and services company that develops and distributes security products to streamline password management and login account administration. M-Tech offers computer network security services such as remote penetration tests, risk analysis, development of secure applications and more. Read More

Evaluating Strategic Information Technology Investment: An Appraisal of Software Alternatives for Small to Medium Enterprises


The problem of information technology investments particularly concerns small and medium enterprises, as they are much more limited in resources than large enterprises. One of the critical questions is whether to implement an open source or closed source solution.

information technology security  Strategic Information Technology Investment: An Appraisal of Software Alternatives for Small to Medium Enterprises The origins of open source and closed source software solutions have different philosophies. The closed source methodology is in most cases practiced by companies which refer to their code as a business secret. In this way they protect their work from piracy and from copycats. The other crucial distinction is that this software is developed to satisfy market requirements. Part One Read More

Arming Your Security Operations with the Right Technology and Services


This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of security or intrusion into data can be damaging for companies, leading to financial losses and diminished reputation. Most companies today require the implementation of a holistic security program, and a partner who is aware of the most relevant technology and service for their kind of business.

information technology security  discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of security or intrusion into data can be damaging for companies, leading to financial losses and diminished reputation. Most companies today require the implementation of a holistic security program, and a partner who is aware of the most relevant technology and service for their kind of business. Read More

Understanding the PCI Data Security Standard


The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance.

information technology security  longer needed. When cardholder information is in motion, the PCI DSS requires use of strong cryptographic keys to protect it. Such keys must be changed regularly, and keys must be carefully managed to include split knowledge and dual control mechanisms. Individuals authorized to work with keys are also required to sign a form that stipulates they understand and accept their key-custodian responsibilities. For data in motion, the PCI DSS mandates use of strong cryptography and security protocols such as Read More

Information/Internet Appliances


Information appliances, also called Internet or PC appliances, are a new market that appeal to those customers who want to reduce their desktop hardware expenditures. What are they, who makes them, and what do you get for your money?

information technology security  Internet Appliances Market Overview Information appliances (also called PC appliances and Internet appliances ) are the latest name for the type of computing similar to that pushed by Oracle CEO Larry Ellison a few years ago under the name of Network Computer . Whatever you call it, this market is new and growing. In recent months, most of the large hardware vendors (Compaq, Dell, Gateway, IBM) have started to announce products or plans for products. In addition, COMDEX '99 highlighted a Read More

Triple Point Technology


Triple Point Technology® is the leading global provider of in-cloud and on-premise Commodity Management software that delivers advanced analytics to optimize end-to-end commodity and energy value chains. The company provides real-time, innovative solutions to competitively address the complex and volatile commodities supply chain: trading, procurement, enterprise risk management, logistics, scheduling, storage/inventory, processing, settlement, and accounting.

information technology security  Point Technology Triple Point Technology® is the leading global provider of in-cloud and on-premise Commodity Management software that delivers advanced analytics to optimize end-to-end commodity and energy value chains. The company provides real-time, innovative solutions to competitively address the complex and volatile commodities supply chain: trading, procurement, enterprise risk management, logistics, scheduling, storage/inventory, processing, settlement, and accounting. Read More

Information Mapping Case Study


Educational institutions have plenty to manage without having to make up for the deficiencies of inadequate learning management systems (LMS). Information Mapping, Inc. decided to switch from its old system to SyberWorks Training Center Learning Management System. The result: more efficient scheduling, integrated data management, better tracking of registration and cancellation, and an increase in seminar attendance.

information technology security  learning management systems (LMS). Information Mapping, Inc. decided to switch from its old system to SyberWorks Training Center Learning Management System. The result: more efficient scheduling, integrated data management, better tracking of registration and cancellation, and an increase in seminar attendance. Read More

Study Shows: FBI Alienates Industry Security Experts


A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best industry security professionals want nothing to do with helping the FBI resolve cybercrime. Recently, one of the leading Department of Justice attorneys general, well-known for expertise in successfully prosecuting cybercrime, asked TechnologyEvaluation.Com why so many security and information technology professionals snub their noses at law enforcement agencies that exist to protect our nation's vital assets - private and public. TechnologyEvaluation.Com went behind the scenes to find o

information technology security  this burgeoning Internet economy, information technology resources are scarce. Inside of that IT circle, information security resources are still more scarce. Taking time out from daily security duties to assist the FBI in a case that may not have directly impacted their own company's bottom line can actually end up costing a company a significant amount of lost revenue. It's often more cost effective to tell law enforcement, No, no logs on any of our systems that would be useful to you than spend Read More

Technology Is My Partner


For AG & Co., embracing new technology was the only way to go if it wanted to continue increasing its revenues. Although it had purchased a new computer system back in 1986, the old software products it was using were non-integrated, making it difficult to keep track of engagements and billing. Billable time meant revenue, so AG & Co. opted to implement BillQuick, and has since reduced its overhead and increased profits.

information technology security  Is My Partner For AG & Co., embracing new technology was the only way to go if it wanted to continue increasing its revenues. Although it had purchased a new computer system back in 1986, the old software products it was using were non-integrated, making it difficult to keep track of engagements and billing. Billable time meant revenue, so AG & Co. opted to implement BillQuick, and has since reduced its overhead and increased profits. Read More

LeadTime Technology


Founded in 1998, LeadTime Technology is a consulting and software company based in Delaware (US) that works exclusively on supply chain optimization (SCO) and control. The company offers proprietary time-based models, Microsoft Windows-based software, advanced business processes, and consulting services. LeadTime Technology leverages Lean, Six Sigma, and supply chain operations reference model (SCOR) principles supported by patented algorithms and technology.

information technology security  Technology Founded in 1998, LeadTime Technology is a consulting and software company based in Delaware (US) that works exclusively on supply chain optimization (SCO) and control. The company offers proprietary time-based models, Microsoft Windows-based software, advanced business processes, and consulting services. LeadTime Technology leverages Lean, Six Sigma, and supply chain operations reference model (SCOR) principles supported by patented algorithms and technology. Read More

Lakeview Technology Inc.


Founded in 1990, Lakeview Technology provides availability management solutions and services for the IBM(r) AS/400(r) midrange system. The company's flagship product suite, MIMIX(r), maintains a real-time copy of a production system's databases and objects on a hot backup. In the event of a planned or unplanned production system outage, MIMIX can switch users to the backup within seconds. The vendor addresses such issues as high availability, continuous operations, disaster recovery, and workload balancing needs.

information technology security  Technology Inc. Founded in 1990, Lakeview Technology provides availability management solutions and services for the IBM(r) AS/400(r) midrange system. The company's flagship product suite, MIMIX(r), maintains a real-time copy of a production system's databases and objects on a hot backup. In the event of a planned or unplanned production system outage, MIMIX can switch users to the backup within seconds. The vendor addresses such issues as high availability, continuous operations, disaster Read More

Web Security: Bullet-Proofing Your Site with SSL


In this security guide from Symantec you'll discover that the best solution can also be the most cost-effective.

information technology security  security bullet proofing ssl,security,bullet,proofing,ssl,bullet proofing ssl,security proofing ssl,security bullet ssl,security bullet proofing. Read More

Harvest Technology Group, Inc.


Harvest Technology Group (Harvest) Solution allows enterprises to automate business processes, collaborate across IT and business boundaries, control the overall state of the business and adapt rapidly and easily to change. The Harvest Solution is a unique offering that provides continued document process improvement by developing a multi-phase, fully integrated system by which your organization can manage. Harvest’s product combines a complimentary, enterprise-wide solution framework for transforming your business into an efficient organization. Our consulting services are available throughout the Harvest Solution continuum to help define, implement, and improve your business processes. Harvest’s business process consulting helps our customers determine the best method for increasing, business efficiencies and reducing costs. These process changes may include new product component capability and/or changes in the document workflow. The results for our customers are continued document process improvements and greater business efficiencies.

information technology security  Technology Group, Inc. Harvest Technology Group (Harvest) Solution allows enterprises to automate business processes, collaborate across IT and business boundaries, control the overall state of the business and adapt rapidly and easily to change. The Harvest Solution is a unique offering that provides continued document process improvement by developing a multi-phase, fully integrated system by which your organization can manage. Harvest’s product combines a complimentary, enterprise-wide Read More