X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 entrust security


Entrust
Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries

entrust security  Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include secure socket layer (SSL), authentication, fraud detection, shared data protection, and e-mail security. Entrust's first public-key

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » entrust security

Baltimore Technologies Doubles Revenues, Offers World-Class PKI Hosting


Baltimore Technologies expects to report a sound quarter and does not expect to be plagued by the same erroneous projections that instigated two class-action lawsuits against Entrust.

entrust security  For more information about Entrust Technologies see Can You Trust Entrust? ) Reporting record revenues of USD $15million for the first quarter of year 2000, and expecting a sound second quarter, Baltimore Technologies is well-positioned to watch its market cap exceed expectations in a ready-for-take-off PKI market. Headquartered in Dublin, Ireland, Baltimore now trades on both the NASDAQ (BALT) and the London Stock Exchange (BLM). Employing nearly 700 people with 26 offices around the world, Baltimore Read More

PKI and Biometrics Ready for Take-Off


Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink.

entrust security  Identix YES BioPassword YES Entrust YES Lexias YES PGP, Inc. YES Baltimore Technologies YES nCipher YES Verisign YES DataKey YES Marshall Software YES RSA Security YES In the biometric group, Identix's easy to install laptop versatile type II PCMCIA card BioTouch product is particularly interesting. The type II PCMCIA card sports an on-board fingerprint scanner that can catalog multiple fingers per user. The scanner pokes out the side of your laptop,and is a little bigger than a postage stamp. You pop out Read More

Supply Chain Shorts for the Week of March 25, 2013


The companies that managed this week to take our minds off of our broken NCAA brackets and the only slightly less broken Red Sox were Epicor, Logility, ProcessWeaver, Quintiq, and Security Engineered Machinery. We also tell you about a few events on our calendar that you might want on your calendar.Logility We recently caught up recently with Karin Bursa to get an update on Logility. Clearly

entrust security  the information that we entrust to our computers, drives and peripherals, PDAs, cellphones, flash drives, and other optical and magnetic media, there is something comforting about  seeing your personal devices ground up  into small pieces.  You can, if you like, watch it happen in SEM’s destruction viewing theater. (A little salt, no butter, please.) On Our Calendar What events are you attending? Here are some of the events on our calendar: Supply Chain World North America , April 8–10, St. Louis, Read More

The "S" in SAP Doesn't Stand for Security (that goes for PeopleSoft too)


During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier architecture. SAP has revealed that they expect the database or third party products to handle security between the application server and the database server. If the client does not take these extra measures, the master password for the SAP database instance travels over the network in the clear, and can be captured. PeopleSoft has the same issue.

entrust security  Security Solution for R/3), Entrust/PKI, Platinum Technology (Computer Associates) Single Sign On, Seclude Sicherheitstechnologie Informationssysteme Seclude for R/3, and Security Dynamics Technology Keon Agent for R/3. They state SAP has decided not to include cryptographic modules in its own software. Instead, external products can be integrated. Market Impact TEC feels that this approach to security is inadequate. Our customer was not informed that this was an issue (note SAP said they had never hear Read More

Vendor Analysis: Interliant's Security Vulnerability Assessment


A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security vulnerability assessment service to find out what their tactical strategy is in helping organizations minimize risk, how this strategy evolved, and what IT decision makers can expect to gain from using their services.

entrust security  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More

End-to-end Encryption Security Requirements


The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules.

entrust security  to-end Encryption Security Requirements The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules. Read More

Cost Effective Security and Compliance with Oracle Database 11g Release 2


Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read this white paper for more.

entrust security  Effective Security and Compliance with Oracle Database 11g Release 2 Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read Read More

New Market for Security Insurance


Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer corporations that they don't get in their standard General Liability Insurance Policy coverage?

entrust security  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More

Security Information Market Heading for Growth


The growth of security vulnerabilities is creating a new market for security information. With link sharing and cooperation among sites, it is not clear that this market is nearly as predatory as some publishing markets.

entrust security  Information Market Heading for Growth Security Information Market Heading for Growth L. Taylor - August 31, 2000 Event Summary It is estimated that the security information market will grow to a $1.5 billion by 2003.[1] With a dearth of security professionals available, viewing online security articles offers companies the opportunity to gain information, and improve system security knowledge at low overhead and a fast pace. Via the web, IT organizations can find out about security bugs, patches, Read More

Need for Content Security


The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best way to appear busy. Employees can open multiple pages, a few of them related to legitimate work, while the others cater to their "personal" interests. It takes a single mouse click or Alt+Tab to navigate between pages, when a supervisor appears. This white paper provides details of how Internet access can be abused and how organisation can keep a tab on its employees.

entrust security  for Content Security Need for Content Security If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. eScan is a complete AntiVirus, AntiSpam and Content Security solution that provides proactive protection against Trojan, Worm, Rootkits, Keyloggers, Malware, Spam and Offensive Content. Source : MicroWorld Technologies, Inc. Resources Related to Need for Content Security : Security (Wikipedia) Need for Content Security Content Security is Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

entrust security  Begins on Your Desktop IT Management Issue Consider this: If the hard drive on your personal computer failed right now: How long would it take for you to be as productive as you were yesterday? Would any clients be inconvenienced? Would you impact the productivity of others in the company? Are you sure that no one else on your corporate network can access the files on your machine? How about when you connect to the internet from home? From a client's site? Is your company providing the proper Read More

Integrated Security: A New Network Approach Part Two: The Shift Toward Integration


This part describes the key elements and benefits of an integrated security solution in comparison to current security solutions.

entrust security  Security: A New Network Approach Part Two: The Shift Toward Integration Integrated Security: A New Network Approach Part Two: The Shift Toward Integration Featured Author - Eric Winsborrow - December 10, 2002 The Shift Toward Integration According to Computer Economics, the worldwide financial impact of malicious code was $13.2 Billion in 2001 alone. With nearly 400 computer security vendors offering solutions spanning the spectrum from antivirus to firewalls, content filtering to intrusion Read More

Security for Small and Medium Businesses


We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from

entrust security  for Small and Medium Businesses We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus Read More