X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 army risk


Check Point Leads Firewall Market
With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.

army risk  unit of the Israeli Army. With fellow founders, Marius Nacht, and Shlomo Kramer, he was able to launch the first release of FireWall-1 in 1994. The wholly owned U.S. subsidiary, Check Point Software Technologies, Inc., was formed in 1995 to lead the company's marketing initiatives. Today the United States represents 60% of the company's market. Vendor Strategy and Trajectory Check Point is positioning itself to be the worldwide leader in securing the Internet. In line with that, Check Point has done a

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » army risk

PeopleSoft Keeps Truckin’ On A Potholed Road Ahead


In spite of the impression that currently PeopleSoft can do nothing wrong, many users of the older versions of its products might be bracing themselves for a less than smooth product upgrade ride.

army risk   Read More

The Three Cs of Successful Positioning Part Four: The Customer


What's keeping your customer up at night? Know thy customers—and their problems.

army risk   Read More

How RFID Technology Can Enhance Your Asset Management Program


Even though the technology has been around in some form since World War II, chances are that you think of Wal-Mart’s supply chain initiative when you hear the words “radio frequency identification,” or “RFID.” Wal-Mart is already seeing a return on their 2005 investment. But does RFID technology make as much sense for asset management as for supply chain management?

army risk   Read More

The Blessing & Curse of SharePoint’s “Grandma’s Attic” - Part 2


Part 1 of this blog series analyzed the runaway success and genesis of Microsoft SharePoint or Microsoft Office SharePoint Server (MOSS). The article outlined the main reasons for the product’s widespread use and analyzed its evolution. So, what is it that SharePoint’s treasure trove of tools (a la “grandma’s attic”) can (and can't) do for companies? What Can

army risk   Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

army risk   Read More

Reducing Operational Risk of IT Service in Finance


An overview for CIOs of the provision and management of IT services at a level that addresses the risk management issues raised by the Basel Committee's New Capital Accord expected to become effective during 2006. Because of the dependence financial institutions have on IT services, the accord requires adequate provision to assure the availability of these services. Centauri Business Service Manager is presented as the solution: one that allows a CIO to assess current risk levels, measure ongoing risk and support a process of ongoing improvement to reduce this risk. Furthermore, Centauri provides the financial institution with a cost-effective balanced scorecard to improve decision-making.

army risk   Read More

IT Project Risk Assessment


Information technology project risk often comes from non-technical aspects of the initiative. Assessing the impact of technology on people, management systems and other initiatives is essential to assure project success.

army risk   Read More

Credit Risk in the US Energy Industry: CNRA and Its Implications


The US energy sector has experienced recent loss of counterparty confidence. To offset this, managing credit risk has become paramount. Knowing what the risks are is just the start—risk mitigation methods must be used to reduce overall credit risk exposure and to free up capital resources. Find out three key ways to mitigate risk, and how a clearing, novation, and release agreement (CNRA) can help guarantee collateral.

army risk   Read More

Operational Risk Management in the World of Big Data


Today, with operational risk emerging as a primary risk threat in all major economies, market players are looking to the potential of big data as a primary driver of next-generation operational risk management. Drawing on current IBM research in the field of big data, this paper shows how operational risk solutions can harness the potential of big data to inform risk management scenarios and analytics.

army risk   Read More

Understanding and Managing Supply Chain Risk


As supply chains continue to grow in size and complexity, companies are focusing more of their energies on managing supply chain risk. While the topic is gaining prominence in boardrooms, many companies do not yet fully comprehend the risks they face. But understanding risk is the first step to managing it—and using the right IT tools can help. Learn what steps you can take to better address your supply chain risks.

army risk   Read More