X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 current trends in information security


Information Security Firewalls Market Report Part Two: Current Market Trends and User Recommendations
Numerous firewall solutions exist in the market. However, decision makers can wade through the thousands of product criteria to find the right solution by

current trends in information security  Market Report Part Two: Current Market Trends and User Recommendations Introduction Firewalls are crucial for companies with information on-line. However, because the security market is mature and well-established, decision makers need to know more than whether to pick an appliance or software firewall. They need to know how to pick the right firewall based on their companies' needs. This can be a daunting experience, given the thousands of criteria each solution has. To help you navigate through the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » current trends in information security

Outsourcing Security Part 3: Selecting a Managed Security Services Provider


As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security services provider.

current trends in information security   Read More

Trends in LMS


Companies and educational institutions use learning management systems (LMSs) to provide training and e-learning. With over 250 LMSs currently on the market, smaller and medium-sized enterprises are now adopting this software and using it to boost performance. Find out why.

current trends in information security   Read More

Current Trends in Messaging


As electronic communication has grown, geographic boundaries have shrunk, enabling an onslaught of mobile executives.

current trends in information security   Read More

Essential ERP - Current Market Trends - Part II


ERP applications are designed to optimize an organization’s underlying business processes — primarily accounting/financial, manufacturing, distribution, and human resources/payroll. This note identifies current trends in the ERP market that we believe are the direct consequence of vendors’ attempts to 1) resolve current ERP functional and/or technological deficiencies, and/or 2) expand software sales both within their existing and potential customer bases.

current trends in information security   Read More

The Complete Guide to Google Apps Security: Building a Comprehensive Google Apps Security Plan


Innovative cloud technologies require new ways of approaching security when it comes to data; traditional systems may be outdated and no longer suffice. Google Apps for Work does provide security within their system, but every company should check for potential protection gaps that may remain. When used in conjunction with other apps, Google Apps for Work gives your business the best protection and fully secures your company’s data. Ensuring your business has the top security measures in place allows people to work with confidence within the cloud, whether workers are onsite or mobile.

This Google Apps for Work protection guide outlines a detailed five-point plan for even greater data security by way of
  • securing core data
  • enhancing email protection
  • extending data recovery
  • locking down document security
  • saving Gmail and Docs for compliance
In this white paper you’ll learn how to customize and configure a variety of Google Apps for Work settings to your company’s specific needs, in a clear step-by-step process. In addition to self-customization, read how your team can further secure core data by using additional solution applications concurrently with Google Apps for Work such as CipherCloud to protect e-mail, Backupify to retain and restore data, Cloudlock for document protection, and Vault to help with compliance issues.

current trends in information security   Read More

Antidot Information Search and Access Solutions


Antidot provides ready-to-use solutions for information search and access that are tailored to the specific needs of content publishers, e-merchants, and business organizations. Read the brochure and see how these software solutions have enhanced the value of the vendor’s customers’ information assets and improved their operational performance.

current trends in information security   Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

current trends in information security   Read More

Standard & Poor's Exposes Customers' Security


Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

current trends in information security   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

current trends in information security   Read More

Executive Brief: Mobility, Security Concerns, and Avoidance


Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy.

current trends in information security   Read More