Featured Documents related to
Lexiguard&;: The Coming
A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price
five-year plan with DES, 3DES, RC2, RC4, or Blowfish, it works like butter. For you public keys, choose between algorithms RSA or Diffie-Helman, with a keysize of 512 up to 2048 bits. All encrypted files are self-signing, and there is no need for a Certification Authority intermediary. It supports LDAP, groups, Netscape 4.x, and IE 4.0, and 5.0 and has a command line interface for those UNIX geeks who have come to loathe GUIs with point-and-click-only attitudes. Market Impact VPNs have proved to be
Firewall RFI/RFP Template
Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, V...
Get this template
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Managing Encryption Keys: Best Practices for Ensuring Data Recoverability
Heightened awareness of vulnerabilities in sensitive stored data has resulted in the increased application of encryption technology. To secure data at rest, a
such as AES or 3DES, are in most cases standardized and publicly available calculations that rely on the application of a unique key and that key’s secrecy to enable privacy. Since encrypted data is generally considered safe to store or transport outside of the bounds of trusted sites, obtaining the data in ciphertext form may not be a major obstacle, and combining that data with its key provides the ciphertext holder with the ability to obtain the data in cleartext form. Because of their sensitive
During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier
S in SAP Doesn't Stand for Security (that goes for PeopleSoft too) Event Summary During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier architecture. SAP has revealed that it expects the database or third party products to handle security between the application server and the database server. If the client does not take these extra measures, the master password for the SAP database instance travels
Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them
Begins on Your Desktop IT Management Issue Consider this: If the hard drive on your personal computer failed right now: How long would it take for you to be as productive as you were yesterday? Would any clients be inconvenienced? Would you impact the productivity of others in the company? Are you sure that no one else on your corporate network can access the files on your machine? How about when you connect to the internet from home? From a client's site? Is your company providing the proper level
SSL123 - Domain Validated SSL Certificates Capable of 128-bit Encryption
thawte now offers an SSL certificate, which is issued within minutes at an affordable price—introducing SSL123. SSL123 is thawte’s response to customers
- Domain Validated SSL Certificates Capable of 128-bit Encryption thawte now offers an SSL certificate, which is issued within minutes at an affordable price—introducing SSL123. SSL123 is thawte’s response to customers’ demands for a fast turnaround, SSL certificate. So, here it is, a cost effective thawte digital certificate that can be issued quickly and still carries the thawte hallmark of trust. Find out what a thawte’s SSL123 certificate do for your business?
How to Achieve Compliance with Payment Cards
Data auditing and data encryption are two key Payment Card Industry (PCI) requirements for maintaining cardholder data protection. Although the two capabilities
to Achieve Compliance with Payment Cards Data auditing and data encryption are two key Payment Card Industry (PCI) requirements for maintaining cardholder data protection. Although the two capabilities are distinct, they’re also synergistic—in fact, PCI recommends using data auditing as a substitute for encryption. Learn more about an auditing and encryption solution that can help you make better decisions about protecting your and your clients’ sensitive data.
VPNs Are Hot, but What Are They?
The Virtual Private Network (VPN) market is exploding. There are many different ideas on what a VPN is, and how to implement them. This article clarifies what
Are Hot, but What Are They? Market Overview Market research firms and vendors are predicting that the worldwide market for VPNs will reach, if not exceed, $10 billion by 2003. Conservatives estimate that the growth rate will be 300%, while others predict a growth rate of up to 1000%. To gain a historical perspective, one might consider X.25 to be the forerunner of VPNs. X.25, an early internet packet switching protocol, and once the cornerstone of Internet WAN links, used virtual private circuits on
Can You Trust Entrust?
An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.
You Trust Entrust? Can You Trust Entrust? L. Taylor - August 1, 2000 Event Summary Entrust Technologies, Inc., headquartered in Plano, Texas with offices in Canada, the United Kingdom, Japan, Switzerland, and Germany is the subject of a class action lawsuit filed by Kirby McInerney & Squire, LLP representing all purchasers of Entrust securities between April 19, 2000 and July 3, 2000. Ironically, Entrust is an information security vendor that specializes in the kinds of products other businesses use to
Hold Onto Your WAPs, Here Come the Apps!
Due to the seemingly certain global standardization on the Wireless Access Protocol (WAP), Short Message Service (SMS) and the addition of Wireless Markup
Onto Your WAPs, Here Come the Apps! Hold Onto Your WAPs, Here Come the Apps! P. Hayes - May 19, 2000 Event Summary Visa U.S.A., the world's leading payment company and CyberBills, the pioneer in total bill management, announced a partnership to offer consumers convenient, cost-effective, and secure wireless bill payment services. Together, Visa and CyberBills will jointly market applications for mobile phones and hand-held devices to enable 'anytime, anywhere' bill payment transactions via the
Remedy Plots A Course To Travel And Expense Capabilities
Remedy further extends the capabilities of its self-service e-procurement application with Necho’s travel and entertainment expense product.
expense management,expense software,purchasing software,bmc remedy,expense tracker,expense report software,expense reports,purchase order software,expense reporting,expenses software,concur expense,expense management software,online expenses,requisition software,sample expense report
Using PKI to Protect Your Business Information
Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. Like ERP and CRM infrastructures,
PKI to Protect Your Business Information Using PKI to Protect Your Business Information Arash Nejadian - December 24, 2003 Executive Summary As organizations evolve, they require new business models to become more efficient or to simply survive in this electronic age. Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. The value of intellectual property has skyrocketed and the need to protect it has become more critical.
No Back Doors. No Open Windows.
To boot or pre-boot, that is the question. There’s no doubt that operating systems (OSs) are complicated given the sheer amount of code that must be flawlessly
Back Doors. No Open Windows. To boot or pre-boot, that is the question. There’s no doubt that operating systems (OSs) are complicated given the sheer amount of code that must be flawlessly interfaced and the potential vulnerabilities that can ensue. While full disk encryption (FDE) is one step closer to a more secure OS, encryption without strong authentication isn’t enough. For security-conscious users, pre-boot authentication is the only way to go.
Closing the Legacy Gap: Protecting Legacy Systems with FDE
Protecting your company’s data is not only wise, but often legally necessary. In order to beef up their data security programs, more companies are implementing
the Legacy Gap: Protecting Legacy Systems with FDE Protecting your company’s data is not only wise, but often legally necessary. In order to beef up their data security programs, more companies are implementing full disk encryption (FDE). In the past, FDE was software based, which left it open to greater security risks. With the advent of new technology, however, it is now possible to migrate from software- to hardware-based FDE while still protecting your existing systems.
The CyberAngel: Laptop Recovery and File Encryption All-in-One
Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.
CyberAngel: Laptop Recovery and File Encryption All-in-One Background According to the Computer Security Institute's 2003 Computer Crime and Security Survey, theft of private or proprietary information created the greatest financial losses for the survey respondents. If you are a medical institution, government agency, or financial institution, information theft can result in violation of patient privacy regulations, loss of customer credit card numbers, unauthorized financial transactions, or
enterprise information management security
eisp enterprise information security policy
sample enterprise information security policy
enterprise information security policy sample
enterprise information security policy explain
enterprise information security policy template
buisness enterprise information security policy
business enterprise information security policy
enterprise information technology security program
forrester wave enterprise security information management
house of representatives cyber security information act
cyber information security
cyber security information
information on cyber security
cyber security information act
cyber law information security
information about cyber security
cyber crime information security
cyber law and information security
cyber crime and information security
cyber security information assurance
career information on cyber security
cyber crime information system security
cyber crime information systems security
office of cyber and information security
Software Evaluation Reports
Features and Functions
Interactive Case Studies
TEC Case Studies
White Paper Newsletters