Home
 > search for

Featured Documents related to »  ebusiness security


Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security
Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace

ebusiness security  Users to Assist in eBusiness Security Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Featured Author -  Laura Taylor - February 16, 2002 Users Fail To Understand The Technology Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security woes, new technologies are often unleashed and implemented before due Read More

Information Security Selection
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » ebusiness security


CA Unloads interBiz Collection Into SSA GT's Sanctuary Part 2: Market Impact
SSA GT believes it is on a path to regain a leading position in its target markets by solving industry-specific business challenges and creating a heterogeneous

ebusiness security  of interBiz , the eBusiness applications division of Computer Associates International, Inc. (NYSE: CA). The acquisition will add many proven solutions to SSA GT's also well-recognized offerings to the industrial sector. Financial terms of the agreement were not disclosed. Through the acquisition, SSA GT believes it is on a path to regain a leading position in its target markets by solving industry-specific business challenges and creating a heterogeneous application environment that works seamlessly Read More
PeopleSoft Supply Chain Is Music To Mid Market Ears
PeopleSoft has once again proven the naysayers wrong about its ability to sell supply chain management. Its Accelerated Supply Chain Management offering

ebusiness security  revenue, PeopleSoft's fixed-price Accelerated eBusiness Solutions allow companies to extend business processes to include their customers, suppliers and employees. In shopping for software vendors, we found that other mid-market Supply Chain solutions couldn't compete, French said. PeopleSoft is committed to our success. Market Impact PeopleSoft has long endured criticism from competitors and analysts at what they have portrayed as a lightweight supply chain product unable to compete effectively with Read More
Can ERP Meet Your eBusiness Needs? Part Three: The Effect of eBusiness on Your Business
The ability to market and sell to expanding markets can easily exceed a company's ability to fulfill the demand along with the expectations that are generated.

ebusiness security  for in formulating your eBusiness strategy. The purchasing or procurement modules of ERP systems have long been modeled after how purchasing departments have operated for decades. Purchase requisitions go through a series of approvals. The automation of this requisitioning and approval process will vary between companies and between ERP systems, but ultimately the requisitions are funneled to the buyers of the purchasing department. Buyers are not only involved in vendor selection and negotiation, but Read More
ASP Infrastructure: The Party Has Started
On June 14th, Nortel Networks unveiled their Comprehensive Service Management Solution for the ASP Market. They've assembled an interesting portfolio of

ebusiness security  Networks (through its Clarify eBusiness applications), mySAP.com solutions, i2 Technologies, Inc., and desktop productivity applications from iPlanet as well as Portal Software's Infranet billing application. Technology from EPiCON, Inc. will be integrated into the Preside Managed Application Services Platform in conjunction with Nortel Networks' acquisition of EPiCON. The first customer release of the platform solution is expected in the next 30 to 45 days and is being tested through Innovatia. Read More
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security

ebusiness security  HP, IBM, Intel and Microsoft Create New PC Security Alliance Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard Read More
Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to

ebusiness security  in the Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle. Read More
Wireless (In)Security Trends in the Enterprise
Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured

ebusiness security  (In)Security Trends in the Enterprise Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal Read More
Integrated Security: A New Network Approach Part Two: The Shift Toward Integration
This part describes the key elements and benefits of an integrated security solution in comparison to current security solutions.

ebusiness security  Security: A New Network Approach Part Two: The Shift Toward Integration Integrated Security: A New Network Approach Part Two: The Shift Toward Integration Featured Author - Eric Winsborrow - December 10, 2002 The Shift Toward Integration According to Computer Economics, the worldwide financial impact of malicious code was $13.2 Billion in 2001 alone. With nearly 400 computer security vendors offering solutions spanning the spectrum from antivirus to firewalls, content filtering to intrusion Read More
IT Security


ebusiness security  Security Read More
2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware
Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to

ebusiness security  Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware 2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Cisco acquired IronPort Systems in June, 2007. Now a part of the Cisco product family, IronPort email and web security appliances protect organizations of all sizes against spam, viruses, Read More
Executive Brief: Mobility, Security Concerns, and Avoidance
Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile

ebusiness security  Brief: Mobility, Security Concerns, and Avoidance Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy. Read More
Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

ebusiness security  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More
Financial Mobility-Balancing Security and Success
No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government

ebusiness security  Mobility-Balancing Security and Success No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more. Read More
Web Hosting Security 2014
Security is a growing threat for hyper-connected and Internet-dependent businesses whose activities increasingly rely on Web hosting servers. This paper

ebusiness security  Hosting Security 2014 Security is a growing threat for hyper-connected and Internet-dependent businesses whose activities increasingly rely on Web hosting servers. This paper examines the extent to which businesses are vulnerable to security breaches and gives an overview of best strategies for protection. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others