X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security and privacy


Data Security, Governance, and Privacy
To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to

security and privacy  Security, Governance, and Privacy To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to improve enterprise data security. For example, companies need secure and verifiable audit trails that track the activities of database administrators (DBAs) and other privileged insiders. But have you considered the seven essential elements of database security?

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security and privacy

Understanding the PCI Data Security Standard


The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance.

security and privacy  Standard MessageLabs Hosted Web Security and Content Filtering service operates at the Internet level, intercepting viruses, and spyware. Source : MessageLabs | Now part of Symantec Resources Related to Understanding the PCI Data Security Standard : Payment Card Industry Data Security Standard (PCI DSS) (Wikipedia) Understanding the PCI Data Security Standard Data Security is also known as : Data Security Architecture , Data Security Articles , Data Security Audit , Data Security Breaches , Data Read More

HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information


HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act (HIPAA) compliance process (US). Relevant Technologies, a leading security research and advisory firm, evaluated HIPAA-Watch for Security to verify how well it performed in guiding organizations through the HIPAA security risk analysis process.

security and privacy  Relevant Technologies, a leading security research and advisory firm, evaluated HIPAA-Watch for Security to verify how well it performed in guiding organizations through the HIPAA security risk analysis process. Vendor Background and Information RiskWatch was founded in 1993 in Landover, Maryland (US) with the idea of automating risk assessment modeling for the Department of Defense. Founder, Caroline Hamilton, a statistical modeling expert, put together a prototype for a risk analysis tool and then Read More

Privacy Challenges for Data Providers


Ensuring the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help.

security and privacy  the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help. Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

security and privacy  FDIC, Significant implications for security and privacy are raised by this reported incident. Market Impact Incidences like the one at NetBank affect not only the institution in question, but the entire online internet banking community. Consumers read about incidences like this and become skeptical about the security of online banking in general. In a letter to its financial institutions, even the FDIC expresses concern over the risks involved in online banking, and states Institutions using the Read More

E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services


In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's lead product line is their Security Vulnerability Assessment service.

security and privacy  near 1200 or so security consultants, and security educators that understand security well-enough to teach security penetration testing to fellow industry security experts (eXtreme Hacking), Ernst & Young is positioned well to offer a robust service in this area. As well, eSecurityOnline has over 1000 security resources available for public viewing. Their security content includes educational materials, product reviews, vendor reviews, and other security news that can help IT security departments stay Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

security and privacy  their website and network security and are often the brunt of ridicule on hacker sites such as the Attrition.org and Hackernews.com websites. What would be the impact of only allowing U.S. companies, and U.S. citizens access to websites ending with the domain classification .gov? Maybe there are valid reasons for leaving our government websites open to the rest of the world. And if there are valid reasons, let's understand them. Traditionally, the U.S. has always had very strong armed forces. But what Read More

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust


Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions from established vendors, like VeriSign, that deliver protection and consumer peace-of-mind through the use of cutting edge technology to meet emerging threats.

security and privacy  business. Look for trust-based security solutions from established vendors, like VeriSign, that deliver protection and consumer peace-of-mind through the use of cutting edge technology to meet emerging threats. Read More

Best Practices for Deploying LAN Security and NAC


Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business.

security and privacy  Practices for Deploying LAN Security and NAC Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business. Read More

6 Important Steps to Evaluating a Web Security Solution


Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control.

security and privacy  to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control. Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

security and privacy  Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More

The Whitelisting of America: Security for IT


Once upon a time around 1995, the well-known American agency, the National Security Agency (NSA), decided that there was no computer operating system that was adequately secure for their needs.  In analyzing the risks, they found that while UNIX was the most secure, they needed additional protection. They looked at the industry of anti-virus protection, at problems with Trojan software, at the

security and privacy  processes that match the security rules and internal certificates. Again, for example, a video driver is only allowed to be a video driver, and nothing else. In the same vein, a program may be allowed to write to a file, but not to use video, or be allowed to trap keystrokes. In effect, like Selinux, whitelisting builds good fences around all modules, and makes for a very secure system. Where whitelisting comes into play big time is in the protection of database systems. All database systems are in need Read More

Developing a Security-oriented Corporate Culture


JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure.

security and privacy  of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure. Read More

Security for Small and Medium Businesses


We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from

security and privacy  that implements a full security program. What To Do Install the appropriate antivirus software. The software works by recognizing the code in the virus’s program that is to be executed, and stops it dead. Two well-known antivirus software products for the desktop and the enterprise are Symantec ( http://www.symantec.com ) and McAfee ( http://mcafee.com ). Both offer excellent products and services that address a business’s network, the server, and the desktop. Usually the purpose of a virus attack to Read More

E-mail Content Security for Small to Medium Businesses


If you’re operating a small to medium business (SMB), you have special needs when it comes to IT security. While large businesses usually have large budgets to invest in the latest technologies, you have to wait until new technologies have proved themselves. One such technology is e-mail content security (ECS). But do you know what makes a good ECS solution and what makes a bad one? If you don’t, you should. Find out now.

security and privacy  technology is e-mail content security (ECS). But do you know what makes a good ECS solution and what makes a bad one? If you don’t, you should. Find out now. Read More