Home
 > search for

Featured Documents related to »  nt security groups


Product Review: GFI's LANguard Network Security Scanner
Performing patch management is one of the most tedious chores that must be completed by network administrators. While there are many patch management tools

nt security groups  that are running Windows NT. These various limitations mean that SUS and SMS Server simply aren't good fits for many organizations. As an alternative to these two products, many companies are turning to third party patch management solutions. One particular patch management solution that I really like is GFI's LANguard Network Security Scanner. Although GFI's LANguard has been around for a while, GFI has recently released version 5. Security Scanning GFI LANguard is much more than a patch management Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » nt security groups


GMAC Web-Enables Legacy Data With NEON Systems Shadow Direct
GMAC is pushing for enterprise-wide web enablement of existing IT assets to support customer self-service platforms. NEON Systems’ Shadow Direct product gives

nt security groups  system servers on Windows NT Development system desktop on Windows NT Speed and Support Even the Visual Basic demo impressed Sadler. There is an area where you're instructed how to use the Shadow Direct psuedo-stored procedure for SQL calls, he said. You can access data and have it returned as an ODBC table. Once I got the data source set up, it rolled. I got something back from my very first entry. It worked very fast, and I didn't have to go through tons of coding. I was able to try many 'what-if' Read More...
Vendor Analysis: Kaspersky Anti-Virus Products Examined
Kaspersky Labs is no newcomer to anti-virus products. Headquartered in Moscow, Russia, with offices in Pleasanton, California and Cambridge, England, Kaspersky

nt security groups  Analysis: Kaspersky Anti-Virus Products Examined Vendor Analysis: Kaspersky Anti-Virus Products Examined Featured Author - Laura Taylor - November 23, 2002 Executive Summary Kaspersky Labs is no newcomer to anti-virus products. Headquartered in Moscow, Russia, with offices in Pleasanton, California and Cambridge, England, Kaspersky Labs has successfully branded itself as a leader in multi-platform anti-virus products. Though many IT decision makers neglect to protect their UNIX systems from viruses, Read More...
Lotus Notes R5 ~ A Breath of Fresh Air
Lotus Notes has just surpassed the 50,000,000-installed base mark, giving Microsoft’s Exchange server a good “run for the money”.

nt security groups  X X X Windows NT (Alpha) X X AIX 4.3.1 X HP-UX 11.0 X Solaris/SPARC 2.6 X Support Announced for Rev 8 Solaris/Intel 2.6 X OS/2 Warp Server 4 X OS/400 V4R2 X OS/390 V2R6 X Linux (Red Hat 6) X Netware 4.x - 5.x X As previously mentioned, the Lotus Notes Domino Server is available in four versions. The following table (Table 2 Below) addresses the differences and pricing for each option. Server Product Features Price (USD) Domino Mail Server Messaging, Calendaring, Discussion Databases and Document Library Read More...
CA Unloads interBiz Collection Into SSA GT's Sanctuary Part 1: Recent Announcement
What are the prospects of SSA GT, now that the revived ERP vendor has recently acquired interBiz with its plethora of application products from its long

nt security groups  Unloads interBiz Collection Into SSA GT's Sanctuary Part 1: Recent Announcement Event Summary Seemingly strange and the things once considered unlikely can happen in the enterprise applications market. A vendor that many have long considered 'gone south' seems to be coming to the rescue of its contemporary and long time fierce competitor, which has been abandoned by its powerful and uncaring parent that has been having troubles of its own lately. On April 8, SSA Global Technologies, Inc. (SSA GT) , a Read More...
Wireless (In)Security Trends in the Enterprise
Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured

nt security groups  (In)Security Trends in the Enterprise Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines Read More...
Focus Experts Guide to IT Security: Unified Threat Management
Find out in Focus Experts Guide to IT Security: Unified Threat Management.

nt security groups  IT Security: Unified Threat Management Unified threat management (UTM) offers an affordable way to protect your small or midsized company from a broad range of network threats. But how do you find the best UTM solution for your needs? What are the choices and options available to you? Who are the UTM vendors you should know about? And how much should you be spending? Find out in Focus Experts Guide to IT Security: Unified Threat Management . You'll get the inside story on UTM solutions in clear, readable Read More...
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security

nt security groups  HP, IBM, Intel and Microsoft Create New PC Security Alliance Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard Read More...
Case Study: Security Benefit
Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For

nt security groups  the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data. Read More...
New Market for Security Insurance
Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer

nt security groups  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More...
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best

nt security groups  resolving cybercrime than law enforcement. Though the FBI thrives on reaping assistance from industry security professionals, many industry security experts are reluctant to help the Federal law enforcement agency when it comes to cybercrime. Though it makes it a lot more difficult for the FBI to track cybercriminals without the help and cooperation of private industry, savvy security experts are not lining up to help. This lack of respect that industry professionals have for the FBI results in cases Read More...
Best Practices for Deploying LAN Security and NAC
Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means

nt security groups  perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business. Read More...
Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

nt security groups  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More...
Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

nt security groups  While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others