X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection
 

 folder security lock


Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

folder security lock  Find Public Key , Folder Security . Executive Summary Secure Folder provides you with a secure electronic desktop workstation. Files and indeed entire folders (directories) can be secured for your personal use, or configured in such a way that they are available for the shared, exclusive use of a selected group. With transparent encryption and advanced management, Secure Folder enables outstanding ease of use and the highest degree of security for sensitive data. Secure Folder uses an acknowledged secure

Read More


Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module ... Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection

Documents related to » folder security lock

Network Security Management


In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents.

folder security lock  Security Management In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More

Standard & Poor's Exposes Customers' Security


Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

folder security lock  & Poor's Exposes Customers' Security Standard & Poor's Exposes Customers' Security L. Taylor - June 21, 2000 Event Summary Standard & Poor's (S&P), a division of McGraw-Hill, knowingly exposed their customers to information security vulnerabilities through their SPComstock analyst service. The security vulnerabilities, originally discovered in January, allowed customers to break into any other customer networks via their MultiCSP turnkey Linux box. The stock quote service, which is provided to Read More

Developing a Security-oriented Corporate Culture


JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure.

folder security lock  a Security-oriented Corporate Culture JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure. Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

folder security lock  Snafu at NetBank Event Summary NetBank (Nasdaq: NTBK ), an Atlanta based internet bank, suffered a major credibility blow last week when a customer named Mahesh Rao reported that he had been inadvertently given access to another customer's account, transaction history, social security number, and funds. Rao had to call NetBank five times before the problem was resolved. According to Tom Cable, Chief Technology Officer of NetBank, the problem occurred due to human error. NetBank is an FDIC insured Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

folder security lock  Security Report Silent and unseen, malware can infect your servers and Web sites, destroy customer trust—and put your business at risk. And the problem is getting worse as cyber criminals use increasingly sophisticated techniques to spread malware through the Web. Learn how to protect your company in the VeriSign Malware Security Report . You'll learn about the methods cyber criminals use, how they attempt to profit at your expense—and how you can stop them. Protect your company from the Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

folder security lock  is Best: Cloud-Based or on-Premise Web security? With so many Internet-based threats, what provides the best protection for your network—cloud-based or on-premise security solutions? As you'll discover in the Aberdeen report , Web Security in the Cloud: More Secure! Compliant! Less Expensive! , cloud-based security solutions out-perform their on-premise counterparts in every critical area: security, compliance, reliability, and cost. Over a recent 12 month period, users of cloud-based Web security Read More

Identity-based NAC and PCI Data Security Compliance


As of June 2006, the payment card industry (PCI) has established a detailed set of policy, procedure, infrastructure, and data security requirements for merchants that store and process credit card data. That’s why it’s vital for key PCI requirements to be met when it comes to encryption, user authentication, virus and malware control, access control, and auditing.

folder security lock  based NAC and PCI Data Security Compliance As of June 2006, the payment card industry (PCI) has established a detailed set of policy, procedure, infrastructure, and data security requirements for merchants that store and process credit card data. That’s why it’s vital for key PCI requirements to be met when it comes to encryption, user authentication, virus and malware control, access control, and auditing. Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware


Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.

folder security lock  Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware 2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Cisco acquired IronPort Systems in June, 2007. Now a part of the Cisco product family, IronPort email and web security appliances protect organizations of all sizes against spam, viruses, Read More

Executive Brief: Mobility, Security Concerns, and Avoidance


Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy.

folder security lock  Brief: Mobility, Security Concerns, and Avoidance Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy. Read More

TCO & Security of Enterprise Grade Mobility


While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management.

folder security lock  & Security of Enterprise Grade Mobility While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management. Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

folder security lock  Risk Assessment and Management in Web Application Security Originally published January 27, 2006 Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of Read More

Institute for Applied Network Security (IANS)


The Institute for Applied Network Security (IANS) conducts and publishes research and analysis. IANS also holds forums and peer-based roundtable discussions.

folder security lock  for Applied Network Security (IANS) The Institute for Applied Network Security (IANS) conducts and publishes research and analysis. IANS also holds forums and peer-based roundtable discussions. Read More

Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security


Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security woes, new technologies are often unleashed and implemented before due diligence and real understanding of these technologies occurs. New products are selected in haste resulting in the deployment of products that might not be the most optimal ones to get the job done.

folder security lock  to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Featured Author -  Laura Taylor - February 16, 2002 Users Fail To Understand The Technology Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security Read More

6 Important Steps to Evaluating a Web Security Solution


Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control.

folder security lock  Important Steps to Evaluating a Web Security Solution Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and Read More