Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.
: IBM Firewall Discontinued IBM Firewall Discontinued L. Taylor - March 13, 2000 Read Comments Event Summary In February, IBM announced that as of the end of this year, it will cease to market the AS/400 add-on Firewall product, and as of May 31, 2001, it will cease to support it. Citing increased competition, and focus on other products as a priority, IBM said that there are enough alternative firewall products on the market for IBM customers. Many of these products provide a superior solution for AS/400
InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention.
: InsideOut Makes Firewall Reporting Useful InsideOut Makes Firewall Reporting Useful Brien Posey - December 17, 2001 Read Comments Introduction If you ve read Laura Taylor s Read Your Firewall Logs! then you understand just how important it is to review your firewall s logs on a daily basis. Unfortunately, firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product
Check Point Leads Firewall Market
With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.
: are a way for remote and mobile users to connect to their corporate network through a secure encrypted channel. Open Platform Focus : Check Point has created an Open Platform for Security (OPSEC) guideline for other information security products that is a security certification, as well as a way for Check Point to make sure that other security products interoperate with theirs. Today Check Point has over 200 OPSEC partners. OPSEC partners use published OPSEC APIs, which allows partners to embed Check
A Firewall is Cheaper Than a Lawyer
eBay's motion for a preliminary injunction to limit Bidder's Edge online auction search engine from linking to their site, may set precedents for future interstate web links. On the other hand, proper implementation of a firewall makes the whole case a moot point.
: A Firewall is Cheaper Than a Lawyer A Firewall is Cheaper Than a Lawyer L. Taylor - May 15, 2000 Read Comments L. Taylor - May 15, 2000 Event Summary On Friday, April 14, the Federal District Court in San Jose, California held a hearing on eBay s motion for a preliminary injunction to limit Bidder s Edge, an online auction search engine, from linking to eBay s website. In an open letter dated April 20th to its user base, President and CEO of Bidder s Edge, Jim Carney, defended his position stating that,
: Fiberlink is the recognized leader in software-as-a-service (SaaS) solutions for secure enterprise mobile device, application and document management.
Off-shoring: Are You Getting Your Money s Worth?
Are companies that offshore software development, call center operations, and remote implementations really saving money? Are customers and users realizing benefits? Indeed, there are areas where savings can be misstated. But companies can do something to protect themselves against disappointments.
: off-shoring decision: software development remote implementation call center support regulatory compliance For each area, the article defines the extent of the exposure, negative outcomes, and ways to mitigate the problem. In this article a scenario is painted of a US-based company using an offshore company. While most off-shoring is flowing out of the US, don t think that other countries are not affected. The language may change, but the same problems exist. Software Development At some point in the
SAN Infrastructure for Disaster Recovery and Business Continuity
Storage area networks (SANs) are key components in IT organizations, as they provide access to and protection of critical data. Managing data storage is becoming increasingly complex, with regulatory and corporate requirements dictating national disaster protection. Whether your company is near or far, remote SANs store your critical data, saving you and your company from losses in even the most dire of circumstances.
: is near or far, remote SANs store your critical data, saving you and your company from losses in even the most dire of circumstances. SAN Infrastructure for Disaster Recovery and Business Continuity style= border-width:0px; /> comments powered by Disqus Related Topics: IT Infrastructure and Development, Archival and Disaster Recovery, Data Center Equipment, Remote Access, Router, Switch Related Industries: Health Care and Social Assistance, Arts, Entertainment, and
9/14/2007 3:40:00 PM
Replicate with Integrity: Protecting VMware Data to Ensure Fast Recovery and Business Continuity
For disaster recovery, remote replication is a simpler alternative to traditional servers. However, simple replication in a virtual server can affect the consistency of files or applications and create longer recovery cycles. Find out how two virtual machine (VM) solutions can overcome these limitations to deliver consistent replication and fast recovery of stored data for uninterrupted processes and business continuity.
: Description: For disaster recovery, remote replication is a simpler alternative to traditional servers. However, simple replication in a virtual server can affect the consistency of files or applications and create longer recovery cycles. Find out how two virtual machine (VM) solutions can overcome these limitations to deliver consistent replication and fast recovery of stored data for uninterrupted processes and business continuity. Replicate with Integrity: Protecting VMware Data to Ensure Fast
6/19/2008 11:56:00 AM
Can Java Perk Legacy Enterprise Resource Planning Systems?
Intentia has poured Java into its enterprise resource planning system, Movex, to meet the growing demand for functional enhancements and remote accessibility, without ripping and replacing legacy systems. However, are users willing to make the transition?
: other realistic solution to remote computing was through Citrix or Microsoft s Terminal Services (MTS) . Further, in 2003, a portal platform called Movex Workplace was made generally available to the Movex suite. In addition to serving as a browser-based user interface and portal, Workplace offers about 4,000 preconfigured work roles and information flows, plus, it represents a nucleus to create other workflows. Through these developments, Movex can offer hardware independence by running hardware,
Search Engines Used to Attack Databases
Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.
3/8/2007 2:27:00 PM
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to be down for the count. Year 2000 will be a better year. The momentum of the market will add enough spark to NAI's new corporate strategy to ignite a profitability flame and help it regain its stance.
: SMTP and Messaging checks, Remote Procedure Call checks, NFS checks, WWW, HTTP, and CGI checks, 72 Optional Vulnerability Checks, and 25 Intrusion Detection checks. Cybercop is used by both the FBI and CIA. Vendor Challenges Gauntlet at one time was a firewall market leader, and has seen rapid decline of new customers in recent years. Checkpoint, Raptor, and Cisco have taken a significant bite out of Gauntlet s customer base in part because NAI failed to keep the development of Gauntlet up to date with
White Paper Newsletters