Home
 > search for

Featured Documents related to » application security



ad
Get Free HR Software Applications Reports

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » application security


Mobile Application Momentum
Take advantage of expertise about mobile application momentum.We bring expert advice right to you.Free white paper. With the boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications is ever more appealing. But the market is changing and evolving rapidly, with new concepts and technologies vying for attention. Discover why, in order to gain momentum, mobile applications need to have both appealing value for customers and the most appropriate, rapid, and wide-reaching routes to market.

APPLICATION SECURITY: Mobile Application Momentum Mobile Application Momentum Source: Quocirca Ltd Document Type: White Paper Description: With the boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications is ever more appealing. But the market is changing and evolving rapidly, with new concepts and technologies vying for attention. Discover why, in order to gain momentum, mobile applications need to have both appealing value for customers and the most appropriate, rapid, and
3/12/2010 6:03:00 AM

Custom Application Development
Custom application development is a trusted, tested strategy to ensure effective application of resources for business advancement and continuity, with minimal risk and solid return on investment (ROI). What’s that, you say? High cost? Low dependability? Long timelines? The custom application development model is plagued by myths. Find out why they’re all wrong.

APPLICATION SECURITY: Custom Application Development Custom Application Development Source: Aalpha Document Type: White Paper Description: Custom application development is a trusted, tested strategy to ensure effective application of resources for business advancement and continuity, with minimal risk and solid return on investment (ROI). What’s that, you say? High cost? Low dependability? Long timelines? The custom application development model is plagued by myths. Find out why they’re all wrong. Custom Application
8/5/2008 3:07:00 PM

Application Program Interface (API)
Electronic document management systems (EDMSs) are used by companies to organize and streamline their document processes to increase productivity and efficiency. Integration between the EDMS and the customized software results in desirable improved efficiencies and savings. This integration can be accomplished using an application program interface (API) that comes along with the EDMS application. Find out how.

APPLICATION SECURITY: Application Program Interface (API) Application Program Interface (API) Source: Cabinet NG (CNG) Document Type: White Paper Description: Electronic document management systems (EDMSs) are used by companies to organize and streamline their document processes to increase productivity and efficiency. Integration between the EDMS and the customized software results in desirable improved efficiencies and savings. This integration can be accomplished using an application program interface (API) that comes along
4/23/2009 4:48:00 PM

The Application Server War Escalates
At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the application server market has become, they argued over whose product was better, faster, cheaper. The keynote was so rife with charges and countercharges that they had to hold an after-keynote press conference to explain themselves.

APPLICATION SECURITY: The Application Server War Escalates The Application Server War Escalates M. Reed - June 25, 2001 Read Comments M. Reed - June 25, 2001 Event Summary At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the application server market has become, they argued over whose product was better, faster, cheaper. The keynote was so rife with charges and countercharges that they had to hold an after-keynote press
6/25/2001

Security for Small and Medium Businesses » The TEC Blog
Project Failures ITBusinessEdge Enterprise Applications blog Laurie McCabe s Blog Logistics ViewPoints blog Manufacturing Operations blog Microsoft s Dynamics CRM Team blog Microsoft s Supply Chain blog Modern Materials Handling blog Next Gen Enterprise On-Demand Sales Performance Management blog Optimal SAP blog OracleApps Epicenter Pegasystems blog PGreenblog ProcessGenie Architect and Analyst Blog ProcessGenie Line Of Business Blog Retail s BIG Blog Service Matters Siemens PLM Software Blog Sixteen

APPLICATION SECURITY: antivirus, Cisco, Juniper Networks, McAfee, software security, Symantec, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
15-04-2008

Application Portfolio Management: Delivering Improved Functionality
The best-kept secrets in application portfolio management secrets revealed!Download our free whitepaper! Today’s technology and application leaders are pressured to deliver functionality that drives efficiency, innovation, and growth—while reducing costs. As a result, technology and application portfolio management (APM) are top business priorities. Learn about a framework for implementing an APM program that can enable your company to monitor and analyze the impact of application changes and reduce portfolio complexity.

APPLICATION SECURITY: Application Portfolio Management: Delivering Improved Functionality Application Portfolio Management: Delivering Improved Functionality Source: Lionbridge Document Type: White Paper Description: Today’s technology and application leaders are pressured to deliver functionality that drives efficiency, innovation, and growth—while reducing costs. As a result, technology and application portfolio management (APM) are top business priorities. Learn about a framework for implementing an APM program that can
10/16/2009 1:04:00 AM

The 7 Habits of Highly Effective Security
You know your organization needs to be proactive about security, but you don't know what that means. You’re a busy executive and you need your security agenda summed up in a nutshell, but you know nothing about information security. What

APPLICATION SECURITY: The 7 Habits of Highly Effective Security The 7 Habits of Highly Effective Security L. Taylor - June 6, 2000 Read Comments L. Taylor - June 6, 2000 Event Summary With cybercrime on the rise, it is important for organizations to make sure that protecting their vital information and assets, and their customers, is not getting overlooked. Sometimes it is the most basic security procedures that are overlooked, e.g,. the utilization of safe, encrypted passwords. Market Impact If every minute of downtime costs
6/6/2000

The Whitelisting of America: Security for IT » The TEC Blog
allows execution of those applications and processes that match the security rules and internal certificates. Again, for example, a video driver is only allowed to be a video driver, and nothing else. In the same vein, a program may be allowed to write to a file, but not to use video, or be allowed to trap keystrokes. In effect, like Selinux, whitelisting builds good fences around all modules, and makes for a very secure system. Where whitelisting comes into play big time is in the protection of database

APPLICATION SECURITY: Database Systems, eWeek, Flask, Jason Brooks, National Security Agency, NSA, Security, Selinux, Whitelisting, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
26-11-2008

Application Life-Cycle Management for ERP: Overcoming the Barriers to Automation
Packaged enterprise resource planning (ERP) systems can be expensive and resource-intensive to implement, but they are critical to business. Disruptions due to application failures, performance problems, or unavailability come at a high price. ERP systems are highly change-oriented and must adapt; as a result, ERP teams are struggling to keep up. This white paper focuses on the issues surrounding the automation of the application life cycle for ERP systems. IDC conducted in-depth interviews with fifteen large PeopleSoft customers to better understand their challenges and needs.

APPLICATION SECURITY: Application Life-Cycle Management for ERP: Overcoming the Barriers to Automation Application Life-Cycle Management for ERP: Overcoming the Barriers to Automation Source: Newmerix Document Type: White Paper Description: Packaged enterprise resource planning (ERP) systems can be expensive and resource-intensive to implement, but they are critical to business. Disruptions due to application failures, performance problems, or unavailability come at a high price. ERP systems are highly change-oriented and must
11/11/2005 3:10:00 PM

Malware Security Report
Learn how to protect your company in the VeriSign Malware Security Report.

APPLICATION SECURITY: Malware Security Report Malware Security Report Silent and unseen, malware can infect your servers and Web sites, destroy customer trust—and put your business at risk. And the problem is getting worse as cyber criminals use increasingly sophisticated techniques to spread malware through the Web. Learn how to protect your company in the VeriSign Malware Security Report . You ll learn about the methods cyber criminals use, how they attempt to profit at your expense—and how you can stop them. Protect
11/23/2010 9:00:00 AM

Security Auditing In Microsoft SQL Server
As digital information has become more and more critical to businesses, firewalls—which once served as the walls of the fortress, have now become an archaic means of defense. Thus, as threats evolve, responses must change as well. Rather than focusing protection solely on perimeter security, it is imperative to look at protecting data at the source—inside the database.

APPLICATION SECURITY: Microsoft SQL Server Source: Application Security, Inc. (AppSecInc) Document Type: White Paper Description: As digital information has become more and more critical to businesses, firewalls—which once served as the walls of the fortress, have now become an archaic means of defense. Thus, as threats evolve, responses must change as well. Rather than focusing protection solely on perimeter security, it is imperative to look at protecting data at the source—inside the database. Security Auditing In Micro
3/8/2007 2:28:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others