X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 social networking security


Social Networking and Opportunities in the Public Sector
Some social networking tools, such as e-mail and instant messaging, are already used in the public sector. Emerging tools, such as blogs and wikis, can also be

social networking security  the Public Sector Some social networking tools, such as e-mail and instant messaging, are already used in the public sector. Emerging tools, such as blogs and wikis, can also be beneficial, allowing more efficient sharing of information, and greater input in decision-making processes. But, there are also headaches involved in managing security issues. Learn about the advantages and how to avoid the disadvantages of new collaboration tools.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » social networking security

The Social Workplace: Using Social Networks to Boost Learning, Collaboration, and Success


Some of the best experts in the business are your long-time employees, top performers, and innovators. Unlock their expertise and the impact could be dramatic. That’s why so many organizations are learning how to use social media tools to create a workforce supported by networking and collaboration. The challenge is to translate the concept of leveraging in-house talent into real-world practices and systems. Find out how.

social networking security   Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

social networking security   Read More

The Lesser-Known (Social) Facts about Microsoft Dynamics CRM


With the continued success of Microsoft Dynamics CRM, one wonders how the company can continue to provide innovative products and dominate the CRM market? TEC principal analyst P.J. Jakovljevic talks with the CRM product manager on how the product’s lesser-known facts, including new social collaboration and customer service capabilities, meet customers’ changing needs and sustain the product’s stronghold of the CRM market.

social networking security   Read More

TIBCO's tibbr 4 and Enterprise Social Graph API


Salesforce Chatter, Jive Software, Saba People Cloud, Microsoft Yammer, etc. are getting some company. TIBCO's tibbr is only 18 months old but already used by a million people in 104 countries, 56 percent of them on smartphones. Users can mark their affinities (likes), post updates, and handle files in TIBCO’s social offering. With tibbr, users can follow anything and support everything, while

social networking security   Read More

Security Information Market Heading for Growth


The growth of security vulnerabilities is creating a new market for security information. With link sharing and cooperation among sites, it is not clear that this market is nearly as predatory as some publishing markets.

social networking security   Read More

Vendor Analysis: Interliant's Security Vulnerability Assessment


A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security vulnerability assessment service to find out what their tactical strategy is in helping organizations minimize risk, how this strategy evolved, and what IT decision makers can expect to gain from using their services.

social networking security   Read More

Social Customer Suite


Lithium’s Social Customer Suite powers customer experiences, helping companies to build brand nations and online communities of customers.  

social networking security   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

social networking security   Read More

Security Stocks Burn Rubber


Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

social networking security   Read More

Network Associates RePositions Itself as a Security E-Village


With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside funding and a type of web-based CIO Helpdesk.

social networking security   Read More