X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 gfi endpoint security


Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

gfi endpoint security  security risk assessment,security risk management,Web security risk management,e-commerce,customer privacy data,default configurations,user input validation,encryption algorithms,encryption,cryptographic accelerator,secure data storage,session management,cookie management,session timeouts,security patches

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » gfi endpoint security

Top 5 Security Tips for 2009


In the white paper top 5 security tips for 2009, discover what smaller companies like yours can do to protect themselves from security threats that...

gfi endpoint security   Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

gfi endpoint security   Read More

Mobile Access Security & Management


The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been further complicated by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices.

gfi endpoint security   Read More

Ernst & Young Leads Big 5 in Security


Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

gfi endpoint security   Read More

Fundamental Principles of Network Security


As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols.

gfi endpoint security   Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

gfi endpoint security   Read More

Aberdeen Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive!


This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read.

gfi endpoint security   Read More

Standard & Poor's Exposes Customers' Security


Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

gfi endpoint security   Read More

Enabling Security in the Software Development Life Cycle


When companies discover new security vulnerabilities, they must retrofit the affected software with an appropriate patch and fend off the wrath of customers. Each newly discovered vulnerability results in a frantic patch, halfway deployed, and potentially opens up another hole. That’s why you should address security vulnerabilities during the software development process—before you get locked into a game of catch-up.

gfi endpoint security   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

gfi endpoint security   Read More