X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 securities


10 Common Mistakes You May Be Making When You Set User Rights and Securities
Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to

securities  Set User Rights and Securities Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to user rights and securities—there are some factors that you need to take into consideration. ERP is a sophisticated system where simple mistakes can cause big problems. It is also an important investment for your company—and you’ll want to make sure users take good advantage of its features. The way user rights

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » securities

Did Sagent Technology Pull the Old 'Pump and Dump'?


Sagent Technology has been hit with a class action complaint for violation of the Securities Exchange Act of 1934. According to the complaint, company officers misrepresented Sagent’s 1999 and 2000 sales prospects to give them time to sell over $8 million of their own stock. The officers sold their stock at prices as high as $27.875, but after the true revenue projections were revealed, the stock dropped as low as $7-7/32. Interestingly, both the Vice President of Sales and the Chief Financial Officer resigned after they received their millions of dollars in proceeds.

securities   Read More

Software Technologies Corporation (STC) Prepares to go Public


Enterprise Application Integration vendor Software Technologies Corp. (STC) announced the filing by the company of a Registration Statement with the Securities and Exchanges Commission relating to the proposed initial public offering of up to $100 million of its common stock.

securities   Read More

i2 Bleeds In Shark-Infested Waters


What a difference a year makes. Two months after the Nike debacle, more than a dozen class action lawsuits for securities fraud are now pending in federal and state courts. Will the SCM vendor find a safe harbor, sink to the bottom, or tread water through 2001?

securities   Read More

Can You Trust Entrust?


An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.

securities   Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

securities   Read More

People’s Role in Cyber Security: Academics’ Perspective


With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities. To examine the extent to which human factors can contribute to either preserving security standards or bringing risk to company data, the whitepaper outlines the most common employee-caused security issues in the corporate ecosystem.

securities   Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

securities   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

securities   Read More

Fixing Security Backdoors: Red Hat 1, Microsoft 0


April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

securities   Read More

Application Security, Inc.


Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step process allows organizations to proactively manage risk by baselining what elements they have and identifying what vulnerabilities are present on them; prioritizing security measures based on value and risk; intelligently applying protection based on this prioritization; and then applying ongoing monitoring to flag any issues. AppSecInc products are the industry's most complete line of security solutions for the application tier that apply to applications the same vulnerability management methodology organizations use to secure their networks and general-purpose operating systems. By securing data at its source, we enable organizations to more confidently extend their business with customers, partners and suppliers while meeting regulatory compliance requirements. Our security experts, combined with our strong support team, deliver up-to-date application safeguards that minimize risk and eliminate its impact on business. Please contact us at 1-866-927-7732 to learn more, or visit us on the web at www.appsecinc.com

securities   Read More