X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 computer security


Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security

computer security  trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard says, This workgroup was formed to define the necessary set of capabilities for a security subsystem that would allow a system integrator and solution provider to establish trust on a hardware platform. The Alliance also stated that personal computers lack a standard set of system hardware-based functions needed to establish trust on the platform. The cited mission is somewhat

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » computer security

Security for Small and Medium Businesses


We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from

computer security  the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus program as an attachment, or from visiting a web site that has been compromised. By visiting such a web site, the virus can be unknowingly Read More

Descartes Acquires Computer Management USA


Descartes Systems Group recently acquired Computer Management USA, a U.S.-based provider of security filing solutions and air cargo management solutions for airlines and their partners. The all-cash purchase price for the acquisition was US $6.6 million.

computer security  Systems Group recently acquired Computer Management USA , a U.S.-based provider of security filing solutions and air cargo management solutions for airlines and their partners. The all-cash purchase price for the acquisition was US $6.6 million.   Computer Management's solutions help air carriers streamline security filing and customs clearance processes, directly and through coordination with ground handlers and container freight stations. The air cargo community struggles with a rapidly evolving Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

computer security  Internet Society's Expectations for Computer Security Incident Response . BEGINLYX Read More

Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough


Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective.

computer security  a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective. Read More

Computer Guidance Corporation


Computer Guidance Corporation has a track record of helping commercial contractors achieving quantifiable benefits as a result of implementing our eCMS construction management solution and accompanying business process consulting services.

computer security  Guidance Corporation Computer Guidance Corporation has a track record of helping commercial contractors achieving quantifiable benefits as a result of implementing our eCMS construction management solution and accompanying business process consulting services. Read More

Financial Mobility-Balancing Security and Success


No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more.

computer security  Mobility-Balancing Security and Success No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more. Read More

Case Study: Security Benefit


Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data.

computer security  Study: Security Benefit Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data. Read More

Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security


Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security woes, new technologies are often unleashed and implemented before due diligence and real understanding of these technologies occurs. New products are selected in haste resulting in the deployment of products that might not be the most optimal ones to get the job done.

computer security  to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Featured Author -  Laura Taylor - February 16, 2002 Users Fail To Understand The Technology Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security Read More

Aberdeen Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive!


This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read.

computer security  Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive! This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read. Read More

Focus Experts Guide to IT Security: Unified Threat Management


Find out in Focus Experts Guide to IT Security: Unified Threat Management.

computer security  focus experts guide security unified threat management,focus,experts,guide,security,unified,threat,management,experts guide security unified threat management,focus guide security unified threat management,focus experts security unified threat management,focus experts guide unified threat management. Read More

Wireless (In)Security Trends in the Enterprise


Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.

computer security  (In)Security Trends in the Enterprise Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal Read More

IT Security- What You Don't Know Can Cost You Big


In the white paper 7 essential steps to security risk reduction, you'll learn about a program that quantifies your security system's ability to han...

computer security  Security- What You Don't Know Can Cost You Big You have a network and data security system in place. But can you measure its level of effectiveness? Or its preparedness to respond to new threats? If you can't, you're flying blind, and it could cost you. Without the ability to monitor and measure the state of your security system, you're giving up the ability to truly manage it—and that could mean the difference between failure and success. In the white paper 7 Essential Steps to Security Risk Read More

4 Key Steps to Automate IT Security Compliance


An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and enforce IT security. Companies are under increasing pressure to control their IT infrastructures more effectively. Learn how ongoing automated vulnerability assessments, together with well-defined network security policies, can simplify the compliance process.

computer security  is meant to bolster computer and network security within the federal government and affiliated parties (such as government contractors) by mandating yearly audits. Basel II ' The Capital Requirements Directive/Basel II Accord established an international standard that banking regulators can use when creating regulations about how much capital banks need to put aside to guard against the types of financial and operational risks banks face. UK Data Protection Act of 1998 ' The eight principles of the Data Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

computer security  is Best: Cloud-Based or on-Premise Web security? With so many Internet-based threats, what provides the best protection for your network—cloud-based or on-premise security solutions? As you'll discover in the Aberdeen report , Web Security in the Cloud: More Secure! Compliant! Less Expensive! , cloud-based security solutions out-perform their on-premise counterparts in every critical area: security, compliance, reliability, and cost. Over a recent 12 month period, users of cloud-based Web security Read More