Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.
: IBM Firewall Discontinued IBM Firewall Discontinued L. Taylor - March 13, 2000 Read Comments Event Summary In February, IBM announced that as of the end of this year, it will cease to market the AS/400 add-on Firewall product, and as of May 31, 2001, it will cease to support it. Citing increased competition, and focus on other products as a priority, IBM said that there are enough alternative firewall products on the market for IBM customers. Many of these products provide a superior solution for AS/400
Firewall for Beginners
Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution.
: Firewall for Beginners Firewall for Beginners Source: Wipro Technologies Document Type: White Paper Description: Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution. Firewall for Beginners style= border-width:0px; /> comments powered by Disqus Related Topics: Security, Firewall Source: Wipro Technologies Learn more about Wipro Technologies Readers who downloaded this white paper also read these popular
7/30/2008 6:02:00 AM
Your Challenge: Get Decision Makers' Approval for NetBIOS Firewall - Preventive Technologies for a Secure Future. Specific, Measurable, Achievable, Relevant and Time-Bound. How many times do you hear network administrators scream at the top of their voice,
: | kerio firewall | list firewall | maintenance preventive | managed network security | management data security | management security | monitoring network | nat firewall | nat wins | netbios block | netbios client | netbios configuration | netbios connection | netbios dhcp | netbios disable | netbios dns | netbios linksys | netbios list | netbios nat | netbios port | netbios port numbers | netbios ports | netbios protocol | netbios proxy | netbios router | netbios security | netbios server | netbios
9/6/2005 1:25:00 PM
InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention.
: the InsideOut firewall compatibility list. At the time that this review was written, InsideOut only supported Check Point s Firewall-1, Cisco s PIX firewall, NetScreen and BorderWare . However, in the very near future, InsideOut will support other firewalls including Stonegate , Raptor , Cisco IOS , Gauntlet , and Microsoft s Proxy Server . Another thing that Stonylake Solutions plans on doing in the near future is releasing firewall specific versions of InsideOut. For example, in the future there will
Human resource (HR) Software Comparison Report
Select free report software by choosing from TEC's list of HR vendors. Get a detailed analysis comparing functions and features of the HR solutions.
: solution. Choose from TEC s list of HR vendors: ADP, ePower, Infor, Microsoft, Oracle, Ramco Systems, Sage, SAP, UNIT4, and more. You ll instantly get a detailed analysis comparing functions and features of the HR solutions you ve picked out. For your own customized HR comparison report, select a category below: Human Resources (HR) Incentive and Compensation Management Human Resources (HR) List of HR software for Human Resources (HR): ABSALOM , by Absalom Systems Australia Pty Ltd. Accero Cyborg , by
6/3/2010 12:11:00 PM
Descartes Systems Group Makes D&T Growth List
WATERLOO, Ontario--(BUSINESS WIRE)--Sept. 15, 1999 -- The Descartes Systems Group, Inc. DSGX, CA: DSG, a leading provider of e-business solutions, is proud to announce that it has been recognized as a 1999 Canadian Technology Fast 50 Company, an annual ranking by Deloitte & Touche of the 50 fastest growing technology companies in Canada. Rankings are based on the percentage of growth in revenues from 1994 - 1998 (five-year period). Descartes' increase in revenue of 1247% over 5 years resulted in a Number 21 ranking overall in the Canadian Technology Fast 50 for 1999.
: Group Makes D&T Growth List Descartes Systems Group Makes D&T Growth List Steve McVey - September 20, 1999 Read Comments Descartes Systems Group Makes D&T Growth List S. McVey - September 20th, 1999 Event Summary Deloitte & Touche ranked Toronto-based Descartes Systems Group, Inc. number 21 on their list of 50 fastest growing Canadian technology companies. Descartes obtained their position on the list because of their 1247% increase in revenues since 1994. Market Impact Descartes growth has rocketed
Data Management Wish List: IT Is Open to Big Changes
Data management, access, and analysis haven’t always received the same amount of consideration, or respect, as the corporate applications that generate and consume the data. In recent years, however, information technology (IT) leaders have focused much more attention on their organizations’ data management platforms and capabilities. Download this white paper to get a better picture of the current data management landscape.
: Data Management Wish List: IT Is Open to Big Changes Data Management Wish List: IT Is Open to Big Changes Source: Mindshare Technologies Document Type: White Paper Description: Data management, access, and analysis haven’t always received the same amount of consideration, or respect, as the corporate applications that generate and consume the data. In recent years, however, information technology (IT) leaders have focused much more attention on their organizations’ data management platforms and
2/8/2013 5:26:00 PM
Top 10 Excuses For Not Securing Your Website or Network
With so many sites lacking security, we have put together a list of the leading reasons why businesses and organizations are unable to secure their network. Don't let your IT department fall victim to unprecedented security breaches. Accept no excuses.
: Top 10 Excuses For Not Securing Your Website or Network Top 10 Excuses For Not Securing Your Website or Network L. Taylor - May 23, 2000 Read Comments L. Taylor - May 23, 2000 Introduction If your company is like most, it has neglected to perform basic due diligence in securing its vital assets. How and why does such a critical part of information technology management get overlooked? The amount of excuses we have discovered is endless. Here are some of the best: No one forced us to do it. Our
: Selerant provides enterprise product lifecycle management software for formula-based process industries.
Best Practices for Implementing a Security Process
Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But without a solid process backing up the technology, organizations will still be susceptible to emerging threats. Learn more about aligning security processes with the latest security technologies to create a barrier against today’s most insidious threats.
: Best Practices for Implementing a Security Process Best Practices for Implementing a Security Process Source: Symantec Document Type: White Paper Description: Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But without a solid process backing up the technology, organizations will still be susceptible to emerging threats. Learn more about aligning security processes with the latest security technologies
11/17/2010 12:46:00 PM
Information Security Firewalls Market ReportPart Two: Current Market Trends and User Recommendations
Numerous firewall solutions exist in the market. However, decision makers can wade through the thousands of product criteria to find the right solution by properly prioritizing company’s needs, avoiding common pitfalls, and through proper research.
: not have any litigation listed against it on the SEC web site. Information on SEC filings for all the companies profiled in this article can be found at http://www.sec.gov . Market Predictions and Forecast The firewall market is large enough to support multiple vendors; however, current market leaders will have to be extremely competitive to maintain their positions. Many large organizations purposely purchase different brands of firewalls to set up security demilitarized zones (DMZ) that take advantage
White Paper Newsletters