X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security


Outsourcing Security Part 3: Selecting a Managed Security Services Provider
As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security

security  Security Part 3: Selecting a Managed Security Services Provider Introduction It's the middle of the night. A shadowed figure crouches by the window. He retrieves a menacing instrument and begins fiddling with the lock. But the intruder won't get far: the homeowners have contracted a security provider to monitor a tight alarm system-or so they thought. Actually, the security company has recently gone out of business and failed to notify its customers. As the intruder makes his way into the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security

The Whys and Hows of a Security Vulnerability Assessment


TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?

security   Read More

Security Innovation


Security Innovation has been identifying application security risks for top software vendors and US government agencies since its inception. The company offers security services from application testing, to security code review, to auditing. Security Innovation was founded by a recognized authority in software security and is managed by software industry veterans and a team of experts that came from companies like Microsoft, Lockheed Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT.

security   Read More

Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough


Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective.

security   Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

security   Read More

A Couple of "Five Procurement Commandments" in a Down Economy


As is the case with white papers, vendors' press releases (PR) can range from blatant bragging about the "latest-and-greatest" product capabilities (and other marketing "fluff") to tastefully asserting competence and educating the market about specific issues. One example of the latter would be Emptoris' April 2008 PR on the findings  of a panel of financial and procurement experts that have

security   Read More

How Can Fashion Companies Benefit from Lean Supply Chains?


Fashion companies need to respond quickly and strategically to major changes occurring in today’s global supply chains. Implementing a lean supply chain management strategy can enable cost savings and more efficient operations by realigning process according to a demand-driven model. Lean supply chain management uses Web-based technologies to create and maintain dynamic supplier networks. Such networks are able to deliver the highest customer value at the lowest cost. It also lays the groundwork for the next level of hands-free, wireless radio frequency identification-enabled processes. Intentia, in cooperation with industry experts, have written a series of thought leadership white papers on the concept of implementing lean supply chain in the fashion industry. The first of this series, “Lean Is Fashionable”, explores the impact of lean practices in the fashion and apparel industry during a period of momentous change.

security   Read More

Enterprise Information Management: Strategy, Best Practices, and Technologies on Your Path to Success


New data sources, unstructured data, and greater volumes of data than ever before are creating an information overload. Plus, customers’ demands for faster service stress front-office applications, while parallel demands from internal users place greater demands on back-office systems. Before you discover that your data quality has been rendered ineffective, consider adopting enterprise information management (EIM).

security   Read More

10 Ways to Sell Upper Management on a Network Upgrade


There are many legitimate reasons for upgrading your company’s enterprise network. The trick is selling those reasons to the executives holding your company’s purse strings. When you know it’s time for a network upgrade, you need more than just the technical facts—you have to arm yourself with a solid business case. Start with 10 tips that can help you sell the members of your upper management team on a network upgrade.

security   Read More

Mid-market Manufacturers and the New Landscape for Enterprise Resource Planning: Using Technology to Compete


The globalization of discrete manufacturing is forever changing the notion of what a "small manufacturer" is. Even companies that are considered relatively small in revenue, employment, or client base, must now operate like the largest corporations when structuring and conducting their businesses. Infor examines how today's mid-market manufacturers are transforming themselves—focusing on business processes and employing ERP systems for their own operations.

security   Read More

Energizing Utilities for the Economic Stimulus Plan: Strategies for Greater Efficiency and Sustainability


For years, utilities have seen a growing need to enable a smarter electric grid, promote cleaner power sources, and replace aging structures. These issues came into sharper focus when US President Obama signed into law the American Recovery and Reinvestment Act (ARRA). This legislation provides funding for many energy initiatives—however, strict compliance guidelines come with the stimulus plan. Find out more.

security   Read More