Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Secure in a Foundry
Foundry Networks™, Inc. announced that they would be incorporating Secure Shell (SSH) Technology for free in all of its high-performance switching devices. That’s right! Foundry Networks has just made every Network Manager’s dream come true.
: Secure in a Foundry Secure in a Foundry G. Duhaime - June 9, 2000 Read Comments G. Duhaime - June 9, 2000 Event Summary Foundry Networks, Inc. announced that it would be incorporating Secure Shell Technology into all high-performance switching devices free of charge. According to Ken Cheng, Vice President of marketing for Foundry Networks, The internet has become the mass communication medium and an economic way to communicate among remote sites. It is used increasingly to access networking devices for
Secure Your Search Engine
Webservers running the search engines are vulnerable to a serious security compromises. Without careful implementation, user passwords and logins can be stolen, and the entire server could be brought to its knees by hackers.
: Secure Your Search Engine Secure Your Search Engine L. Taylor - October 26, 1999 Read Comments Event Summary A serious root level compromise on Zeus Technologies high-performance web-server was reported on the well-known Bugtraq security mailing list earlier today. In its insecure state, the Zeus search engine, which is transportable to virtual websites, can be used to request any file on the webserver, including the password file which contains the root password. Once you are logged into a UNIX server
Tempest Creates a Secure Teapot
Tempest Software has announced the release of TMS (Tempest Messenger System) version 3.1.1. The product allows suppliers and customers to query corporate databases without any direct access to the actual web or database servers. A firewall is placed between the Internet and the internal systems and the firewall is configured to allow no incoming traffic. This product should prove to be a great annoyance to hackers everywhere.
: Tempest Creates a Secure Teapot Tempest Creates a Secure Teapot M. Reed - October 30, 2000 Read Comments M. Reed - October 30, 2000 Event Summary Tempest Software, Inc. today announced it is shipping Release 3.1.1 of its flagship TMS (Tempest Messenger System) product. The enhanced capabilities in this new release are said to raise the standards of performance in Internet enterprise application exchange. The new release includes a feature referred to as TSWEG , or Tempest Secure Web Gateway, which
Secure Mobile ERP—Is It Possible?
Mobile devices are the workstation of the future—the new normal. Today’s organizations need to support mobile devices, whether this means adapting current enterprise solutions or evaluating new enterprise solutions. But this presents new security challenges. Read this article to discover how information technology (IT) departments can collaborate with end users to find a balance between control and access.
: Secure Mobile ERP—Is It Possible? Secure Mobile ERP—Is It Possible? Rick Veague - April 10, 2012 Read Comments The proliferation and increasing power of handheld devices and rising expectations among enterprise resource planning (ERP) and enterprise asset management (EAM) users for constant mobile access to business data is creating new demands and challenges for corporate information technology (IT) departments. With the trend toward bring your own device (BYOD), IT departments are finding it
4/11/2012 10:12:00 AM
Secure Implementations of Content Protection (DRM) Schemes on Consumer Electronic Devices
The need for secure digital rights management (DRM) implementations is real, and it is happening now. Secure and robust DRM implementation, as defined by content owners, is mandatory in order to enable premium content licensing by the service provider. Such robust implementation requires an in-depth understanding of the security vulnerabilities of today’s connected devices. This white paper explains what you require to build a secure DRM solution.
: Secure Implementations of Content Protection (DRM) Schemes on Consumer Electronic Devices Secure Implementations of Content Protection (DRM) Schemes on Consumer Electronic Devices Source: Discretix Document Type: White Paper Description: The need for secure digital rights management (DRM) implementations is real, and it is happening now. Secure and robust DRM implementation, as defined by content owners, is mandatory in order to enable premium content licensing by the service provider. Such robust
6/6/2012 10:14:00 AM
Firewall for Beginners
Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution.
7/30/2008 6:02:00 AM
Trend Micro Anti-Virus Server for Microsoft Exchange ~ A Secure Choice For Enterprise Wide Anti Virus Protection.
Some of the more widely known viruses, such as the
: Microsoft Exchange ~ A Secure Choice For Enterprise Wide Anti Virus Protection. Trend Micro Anti-Virus Server for Microsoft Exchange ~ A Secure Choice For Enterprise Wide Anti Virus Protection. P. Hayes - December 1, 1999 Read Comments Event Summary LAS VEGAS--(BUSINESS WIRE)--Nov. 15, 1999-- Trend Micro, Inc. (Nasdaq: TMIC - news ), a leading provider of centrally managed Internet virus protection and content filtering products and services, today announced that its award-winning ScanMail for Microsoft
: Founded in 2001, FieldOne offers a secure and scalable service management system providing field service companies with powerful tools to streamline their business processes.
Best Practices for Deploying LAN Security and NAC
Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business.
: Best Practices for Deploying LAN Security and NAC Best Practices for Deploying LAN Security and NAC Source: Nevis Networks, Inc. Document Type: White Paper Description: Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat
8/30/2007 1:22:00 PM
eCLIPse, Encryption Security Solution
: eCLIPse Enterprise Security Solution is an encryption software security solution for any business that requires frequent exchange of secure encrypted data.
Best Practices in Authentication and Access Control: Comparing 802.1x to the Nevis LAN Security Approach
The 802.1x protocol should be the obvious choice when implementing user-based authentication in enterprise networks. So why doesn’t everyone use it? Because it doesn’t give a complete solution for authentication and policy requirements, even when it’s integrated with a network access control (NAC) solution. But if you integrate 802.1x with a local area network (LAN) secure switch, you get a more complete secure solution.
: local area network (LAN) secure switch, you get a more complete secure solution. Best Practices in Authentication and Access Control: Comparing 802.1x to the Nevis LAN Security Approach style= border-width:0px; /> comments powered by Disqus Related Topics: Networking, LAN and WAN, Security, Access Control, Vulnerability Scanning and Assessment Source: Nevis Networks, Inc. Learn more about Nevis Networks, Inc. Readers who downloaded this white paper also read these popular documents!
8/30/2007 1:16:00 PM
White Paper Newsletters