Home
 > search for

Featured Documents related to »  secure messaging

Jabber XCP: The Secure Choice for Presence and Messaging
At Jabber, Inc., security is a core priority in every phase of design, implementation, and deployment. We aggressively apply lessons learned from other Internet

secure messaging  XCP: The Secure Choice for Presence and Messaging At Jabber, Inc., security is a core priority in every phase of design, implementation, and deployment. We aggressively apply lessons learned from other Internet-scale technologies and from our work with customers in the financial, government, and telecommunications sectors to achieve continuous improvement in the security profile of our products. In this whitepaper, we delve into the core security features of Jabber XCP. Read More...
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » secure messaging


Tempest Creates a Secure Teapot
Tempest Software has announced the release of TMS (Tempest Messenger System) version 3.1.1. The product allows suppliers and customers to query corporate

secure messaging  method of achieving these secure transactions is common in many messaging systems. It is basically designed as an asynchronous store and forward system (the TMS server accepts the message and delivers it at the proper time, while the sending application moves on as if everything was completed). This could eliminate a formerly common practice used by many corporations of duplicating their databases outside the firewall and then keeping them synchronized, so the suppliers and customers only see the Read More...
Are Your Company Laptops Truly Secure?
The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and

secure messaging  the actions taken to secure computers remain deployed and intact until the computer can be located. COMPLIANCE. PROTECTION. RECOVERY. A LAYERED APPROACH TO CORPORATE SECURITY THE POWER OF MOBILITY The power of mobility afforded by laptop computers has meant that tremendous flexibility and productivity has become the standard of business for most information workers. Mobility means being able to perform professional corporate presentations while visiting clients; update a budget while traveling on Read More...
MCI WorldCom and Critical Path Power into Outsourced Messaging
MCI WorldCom and Critical Path plan to offer the following services: Web mail service, starting at $2 per user, per month, POP3 mail service starting at $3.50

secure messaging  e-mail management. Critical Path's secure hosting environment, coupled with the speeds and feeds of MCI WorldCom's frame relay network, not to mention reputation, should propel MCI WorldCom to the forefront of Messaging Application Service Providers (MASP). The majority of Messaging ASPs are generally start-ups, some well funded, some not, leading to uncertain financial viability which can (and will) negatively impact the anticipated service levels. One of MCI WorldCom's greatest strengths, besides their Read More...
How Secure is Your E-Mail?
A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read

secure messaging  City, CA, (www.rsa.com) for secure transmission. S/MIME was introduced in 1996, and has emerged as the messaging industry's standard for secure e-mail. S/MIME utilizes Public Key Cryptography Standards (PKCS) to ensure cross-platform and multi-vendor compatibility. S/MIME has been, and continues to be widely adopted by the messaging industry. S/MIME, like MIME, uses two cryptographic encoding methods that both utilize RSA (PKCS), a digital signature and a digital envelope. The digital signature provides Read More...
Active Voice Adds Unified Messaging to Cisco’s CallManager
The Cisco CallManager is an IP based telephony system that will utilize Active Voice’s software to deliver a reduced dependency on external hardware to achieve

secure messaging  Voice Adds Unified Messaging to Cisco’s CallManager Active Voice Adds Unified Messaging to Cisco's CallManager P. Hayes - July 17, 2000 Event Summary (Seattle, Washington, USA-July 26, 2000) - Active Voice Corporation, a global provider of unified messaging and computer telephony software solutions, announced that Unity Enterprise-its Windows NT-based true unified messaging server-will support integration with the latest version of Internet Protocol (IP) telephony call processing software from Cisc Read More...
Financial IT Reg Enforcement Service: Using FFIEC Security Best Practices to Ensure Laptops and PCs are Secure and Compliant
Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices

secure messaging  Laptops and PCs are Secure and Compliant Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance. Read More...
Secure Information Sharing
With data theft on the rise, many companies are forced to improve their network security. And although they spend millions of dollars every year on securing

secure messaging  protecting the information itself. Secure information sharing (SIS) solutions integrate additional intelligence into the process—and protect your data without added overhead. Read More...
O2 Germany GmbH Case Study: Leading Mobile Service Provider Keeps Pace with Secure, Cost Effective Mobility Solution from Fiberlink


secure messaging  Provider Keeps Pace with Secure, Cost Effective Mobility Solution from Fiberlink Read More...
AT&T PocketNet Service Goes Wireless With Novell GroupWise
Novell’s GroupWise product is the second collaborative messaging system that has teamed with AT&T for the wireless PocketNet service. Lotus Notes currently has

secure messaging  T PocketNet Service Goes Wireless With Novell GroupWise Event Summary SALT LAKE CITY (BrainShare 2000), March 27 /PRNewswire/ -- Novell, Inc. (Nasdaq: NOVL - news), a leading supplier of Net services software, announced the public beta availability of wireless access to Novell GroupWise via AT&T PocketNet service for business customers. GroupWise, Novell's premier knowledge platform and a key component in the new DENIM(SM) Net Portal Services strategy, will now deliver a wide array of Net services Read More...
Telligent Acquires the Messaging and Collaboration Solution Zimbra
Telligent has acquired Zimbra from VMware. According to the press release, Telligent will be merging with Zimbra and eventually change its name to Zimbra. The

secure messaging  Acquires the Messaging and Collaboration Solution Zimbra Telligent has acquired Zimbra from VMware . According to the press release, Telligent will be merging with Zimbra and eventually change its name to Zimbra. The latter is expected to benefit from investments from Intel Capital, NXT Capital Venture Finance, BDCA, Hall Financial Group, and VMware. The leadership of the new company will be ensured by an integrated management team with Telligent's CEO Patrick Brandt at the top. The new Read More...
Testing Secure Enterprise SOA Applications Across Wide Area Networks
Company employees, business partners, and customers all demand secure and low-response-time access to business applications—from wherever they are. While SAP

secure messaging  Secure Enterprise SOA Applications Across Wide Area Networks Company employees, business partners, and customers all demand secure and low-response-time access to business applications—from wherever they are. While SAP addresses this need through its enterprise service-oriented architecture (SOA) solution, when security features are added the application response time is slower. So what’s the best way to test global SOA deployments? Read this white paper to find out. Read More...
Critical Path and NETIAN Strike Strategic Messaging Alliance
NETIAN, South Korea’s largest ISP has selected Critical Path’s Inscribe messaging service to meet the demands of South Korea’s explosive e-mail growth. Critical

secure messaging  Path and NETIAN Strike Strategic Messaging Alliance Critical Path and NETIAN Strike Strategic Messaging Alliance P. Hayes - July 28, 2000 Event Summary Critical Path Inc., the dominant global provider of Internet messaging and collaboration solutions, has announced that NETIAN, the largest Internet Service Provider (ISP) in South Korea, has chosen Critical Path's InScribe Messaging Server with a Korean language web client interface to power messaging services for 3 million users. Market Impact Read More...
Secure Remote Control: Security Features for Enterprise Remote Access and Control
Since its inception in the 1980s, remote control software has come a long way—evolving into sophisticated tools that provide much more than just simple remote

secure messaging  Remote Control: Security Features for Enterprise Remote Access and Control Since its inception in the 1980s, remote control software has come a long way—evolving into sophisticated tools that provide much more than just simple remote control. But with the wide range of remote control products on the market, it is important to know which features are truly beneficial, in order to separate the good from the bad. Read More...
How to Reduce Business Risk through Secure User Access for SAP
Unencrypted communication between users’ workstations and the backend SAP servers is a significant vulnerability to your SAP environment. This can put the

secure messaging  Reduce Business Risk through Secure User Access for SAP Reduce Business Risk and Improve Audit Results through Secure User Access to SAP. Unauthorized access is probably the most significant vulnerability to your business-critical SAP environment. Source : SECUDE International AG Resources Related to How to Reduce Business Risk through Secure User Access for SAP : SAP AG (Wikipedia) How to Reduce Business Risk through Secure User Access for SAP User Access is also known as : User Access Controll , User Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others