X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 glossary security


Standard & Poor's Exposes Customers' Security
Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

glossary security  before affects your network. Glossary warez: A term used by software pirates use to describe a cracked game or application that is made available to the Internet, usually via FTP or telnet, often the pirate will make use of a site with lax security. Widely used in cracker subcultures to denote cracked version of commercial software, that is versions from which copy-protection has been stripped.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » glossary security

The Path to Healthy Data Governance through Data Security


Companies today are challenged to maintain their data safe and secure from hackers and others with unauthorized access. In his article, TEC business intelligence (BI) analyst Jorge García looks the risks and issues that companies face with securing their data, the importance and advantages of data security, and outlines a path that companies can follow to achieve data security as part of an overall data governance initiative.

glossary security   Read More

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

glossary security   Read More

Web 2.0: “Code Free” Siebel Web Service Integration


One of the most challenging areas in any Siebel implementation has traditionally been setting up and maintaining interfaces between Siebel and other back-end systems. However, it is now possible to create a real-time web service interface to other applications from Siebel 7.8 or 8.0, without writing a single line of code.

glossary security   Read More

Tibco Takes a Pragmatic Approach to Multicasting


Tibco Software and Cisco Systems have co-designed a network delivery method called the PGM (Pragmatic General Multicast) protocol. PGM allows a server to transmit a multicast message only once. The PGM software will then ensure delivery to all of the intended recipients. This is a much-awaited improvement on the existing multicast protocol, where the server has to transmit the message to each client individually, which increases the load on the network.

glossary security   Read More

IT Security


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

glossary security   Read More

The Whitelisting of America: Security for IT


Once upon a time around 1995, the well-known American agency, the National Security Agency (NSA), decided that there was no computer operating system that was adequately secure for their needs.  In analyzing the risks, they found that while UNIX was the most secure, they needed additional protection. They looked at the industry of anti-virus protection, at problems with Trojan software, at the

glossary security   Read More

TCO & Security of Enterprise Grade Mobility


While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management.

glossary security   Read More

Fixing Security Backdoors: Red Hat 1, Microsoft 0


April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

glossary security   Read More

e-DMZ Security


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

glossary security   Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

glossary security   Read More