Home
 > search for

Featured Documents related to »  firewall comparatives


Portal Plays Soothe Pain of Divorce
Yahoo tossed Inktomi’s shoes but left the door open for a 'just friends' arrangement behind closed corporate doors. Meanwhile, Inktomi delivers behind the

firewall comparatives  Service behind the corporate firewall with a fee-based product that will present corporate information in combination with selected feeds of Yahoo's currently available content such as weather, news and stock quotes. The logic motivating Yahoo's entry into the portal space seems to be that employees won't visit a corporate portal for the corporate information they need to do their jobs without access to a wide range of the services that are otherwise available for free elsewhere on the Internet. Inktomi Read More...
Firewall
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » firewall comparatives


Protecting Confidential Documents in the Extended Enterprise:
Data security breaches are a common occurrence in business. As such, today’s business climate needs to find better ways to collaborate—without compromising

firewall comparatives  end-to-end protection beyond the firewall. By deploying such a strategy, you can securely accelerate business and gain competitive advantage. Read More...
Winvale to Distribute Socialtext through GSA Schedules
Established in 2002, Socialtext, a Bedford Funding portfolio company (which also owns Peoplefluent), was one of the first companies to deliver social networking

firewall comparatives  or securely behind the firewall as an appliance, Socialtext customers can be provided with flexible deployment options that meet their security requirements. After the recent  partnership with Badgeville for gamification capabilities, this week Socialtext announced its  distribution partnership with Winvale , one of the premier government-focused solutions providers in the United States. After multi-year success implementing the Socialtext software-as-a-service (SaaS) platform with government agencies, Read More...
Check Point
Check Point Software Technologies (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the market leader in the worldwide enterprise

firewall comparatives  worldwide enterprise firewall, personal firewall and VPN markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's ZoneAlarm product line is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect Read More...
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.

firewall comparatives  Firewall Discontinued Event Summary In February, IBM announced that as of the end of this year, it will cease to market the AS/400 add-on Firewall product, and as of May 31, 2001, it will cease to support it. Citing increased competition, and focus on other products as a priority, IBM said that there are enough alternative firewall products on the market for IBM customers. Many of these products provide a superior solution for AS/400 customers. Market Impact Due to the pace at which security technology Read More...
Firewall RFI/RFP Template
Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies

firewall comparatives  RFI/RFP Template Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more Read More...
Integrated Security: A New Network Approach Part Two: The Shift Toward Integration
This part describes the key elements and benefits of an integrated security solution in comparison to current security solutions.

firewall comparatives  and encourage a higher firewall posture, or the firewall technology could initiate a virus scan of a suspicious transmission. This reduces the risk of a technology becoming the weakest link in the security chain, and increases the potential for capture and containment of blended threats. Operational Efficiency of Security Functions Integrated security reduces the need to purchase, install, update, and manage multiple security products or address interoperability issues between various products at each Read More...
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

firewall comparatives  added the well-known Gauntlet firewall to its product line. Boasting a throughput of 11.5mbs, and over 30,000 simultaneous connections, Gauntlet was at one time among the most highly respected and technologically sound firewalls. In recent years however, Gauntlet has seen rapid market share decline. Vendor Strategy and Trajectory With Network Associates expecting to post a loss for FY'99, the bottom line for Year 2000 will likely see an improvement, thanks to a new focus and corporate strategy. Though it Read More...
Earthlink Leads the Way in DSL Security
DSL providers speed up their customers' Internet access, however, at the same time they also expose these customers to enormous security risk. Earthlink has

firewall comparatives  receive Symantec's Norton Personal Firewall 2000, and Mac users receive Open Door's DoorStop firewall. With the ability to provide DSL services to 50 metropolitan areas, Earthlink today is the only ISP that offers built-in security with its DSL services. Earthlink customers receive instructions explaining what they need to do to activate their personal firewall. They also receive a unique secure download key that enables them to download it securely. With a reputation for superior customer service, Read More...
StoneSoft
Stonesoft Corporation (HEX: SFT1V) focuses on enterprise-level network protection and business continuity assurance. Its StoneGate(tm) security platform

firewall comparatives  StoneGate(tm) security platform unifies firewall, VPN, and IPS for business-critical applications. StoneGate incorporates the load-balancing technology of StoneBeat®. Stonesoft's international headquarters is in Helsinki, Finland; the Americas headquarters is in Atlanta, Georgia; and Asia Pacific regional headquarters in Singapore. Stonesoft has offices in the Americas, including Mexico and Brazil. Read More...
Hummingbird Announces Extraction and Portal Strategy for ERP
Boston, October 25 /CNW-PRN/-Hummingbird Communications Limited (TSE:HUM,NASDAQ:HUMC), announced the immediate availability of Genio MetaLink for SAP R/3

firewall comparatives  customers outside the corporate firewall will be key to ongoing customer relationship management, supply chain management, and e-commerce efforts. The release of Genio MetaLink should allow Hummingbird to compete in the relatively fierce business intelligence market with older, more established players such as Ardent and Cognos. In addition, Genio has integration with Hyperion Essbase, a leading OLAP product. User Recommendations The fact that Genio is SAP CA-ALE certified (the ALE concept involves using Read More...
E-learning and Organizational Culture
The success of an e-learning initiative depends as much on the people and culture of the organization as it does on the technology used. Several corporate

firewall comparatives  possible for some. Corporate firewall . If a choice is made to have someone outside the company (like the vendor or another application service provider [ASP]) host the courses, you need to test the corporate firewall to see if the courses can run through it. If they don't, approach the IT department to see if it can be done. If it can't be done, then you will have to run the courses internally. Again, you will need the support of the IT people to provide the necessary server space. You may find that the Read More...
NAI Will Pay Trend $12.5 Million Resulting from Law Suit
Settling a patent dispute out of court, Network Associates agreed to pay Trend Micro $12.5 million for the cost of licensing Trend's patented technologies. Both

firewall comparatives  WebShield, GroupShield, and Gauntlet Firewall products infringe a Trend patent that was issued on April 22, 1997 [1]. Network Associate's SEC filing stated that Trend and NAI agreed to cross-license their anti-virus patents. In this same SEC filing, NAI stipulates, The unaudited consolidated financial statements have been prepared by Networks Associates, Inc. without audit in accordance with instructions to Form 10-Q and Article 10 of Regulation S-X. In May 2000, Trend and Network Associates Read More...
In-house vs. Managed Services: 4 Key Questions You Need to Ask
Installing software and patch updates can be frustrating and time-consuming for IT staff and users alike. But it's critical to update your computers regularly

firewall comparatives  Computers outside the corporate firewall are especially vulnerable to attack. The availability of open, wireless connections exposes notebooks to viruses and malware. To protect your company's network, special approaches like audit trails and exception management are required. Comparing in-house and managed services When developing your software change management strategy, an important step is deciding who will perform the day-to-day work. If you already employ IT staff, should you purchase a software Read More...
Delivery Architecture - What it Means...
Once we cross the border of the enterprise, traditional enterprise-centric systems fail to provide visibility or a way to understand and act, all in sync with

firewall comparatives  is the behind the firewall enterprise solution. Enterprise cohesion is its goal. And these things are required by law. Trading Network In addition, there is the real-time supply chain layer. This can be composed of both internal and external components—an e-commerce front-end and supply chain planning internal enterprise component, and then the supply chain network. This total network requires real-time reasoning and the ability to seek out subscribers of information (publish/subscribe) to perform Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others