X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection
 

 iron security


Secure in a Foundry
Foundry Networks™, Inc. announced that they would be incorporating Secure Shell (SSH) Technology for free in all of its high-performance switching devices. That

iron security  the combination of Foundry's IronWare 7.0 software suite and a built-in feature set that does data encryption and authentication on all Foundry Network Devices. Edge devices will now have an additional layer of protection against hackers. This by no means indicates that your edge devices will never be hacked, but now there is an additional layer of security that was not present before. User Recommendations Can Network Managers say telecommuting!! That's right! Foundry Networks has just made every Network

Read More


Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module ... Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Information Security Selection
Information Security Selection

Documents related to » iron security

E-mail Encryption: Protecting Data in Transit


Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre-assign various setup options before the software is rolled out, which can be locked so that the user can no longer change the default settings. Learn more about the main properties of Secure Mail and get an overview of the possible configurations the product offers.

iron security  Secure Mail Standards | Iron Mail | Secure Anonymous Email | Using Secure Email | Receiving Secure Email | Secure Mail Division | Securemail Desktop | Secure Mail Protocols | Various Secure Mail | SMS Secure Email | SMS Secure Mail Encryption | SMS Secure Inmate Mail | SMS Secure Instant Mail | SMS Secure Mail Appliance | SMS Secure Mail Client | SMS Secure Mail Connector | SMS Secure Mail Delivery | SMS Secure Mail Form | SMS Secure Mail Gateway | SMS Secure Mail Hosting | SMS Secure Mail Port | SMS Read More

TEC Research Analyst Round Table: Software-as-a-Service (SaaS)


Software-as-a-service (SaaS): friend or foe? SaaS—also known as on-demand or hosted applications—is becoming more and more popular in a number of enterprise application areas and quickly changing the minds of many a skeptic. SaaS is changing the way organizations pay for, implement, and run their software applications. Unlike traditional applications, which are paid for up front and installed on

iron security  readers may turn an iron ear if they hear it again. This is a joke of course, but it reflects the reality of SaaS—it’s significant and continual. There is a question that comes to mind, though: Is a company that needs a new ERP system—or any other business application—able to distinguish SaaS vendors’ various sales and marketing efforts? There is no single universal answer to this question because it depends on many factors that are unique to each company and its particular conditions such as Read More

To SaaS or Not, Is That a Question? - SaaSy Discussions (Part IIb)


The first part (Part II) of this blog series described the opportunities for software as a service (SaaS) or on-demand applications, especially in the current difficult economic milieu. Part IIa then analyzed the top five SaaS assumptions (misconceptions) recently outlined by Gartner. Before any vendor can embark onto delivering a SaaS offering, it must thoroughly consider a number of harrowing

iron security  suite , and  Cast Iron Systems . Sonoa Systems provides analytics, management, and IT governance solutions for cloud services and application programming interfaces (APIs ). PaaS The Hosting, Please! This brings us to the discussion about choosing the technology stack  (with the following technical layers: application, deployment platform, and infrastructure) in a do-it-yourself (DIY) or other fashion. Namely, as ZDNet’s blogger and SaaS connoisseur Phil Wainewright explains well in his recent blog Read More

LeveragePoint Adds Value to B2B Pricing - Part 1


TEC’s in-depth 2011 article not only described the opportunities inherent in the business to business (B2B) pricing software market, but also ascertained that the value of this budding software category has yet to become universally known and appreciated. Sensing the opportunity, LeveragePoint is the latest market newcomer with a fresh approach to deal pricing negotiations.

iron security  the case of big iron pricing solutions). This is a software as a service (SaaS) platform that works out of the box. But the vendor does work with a number of smaller firms such as Value Management Advisors who support customers in the following ways: Build value models and value propositions Conduct market research to validate value models and value propositions Build segment, product or industry specific value driver libraries and data libraries Coach on pricing strategy Provide training on value-based Read More

Wireless (In)Security Trends in the Enterprise


Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.

iron security  (In)Security Trends in the Enterprise Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal Read More

E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services


In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's lead product line is their Security Vulnerability Assessment service.

iron security  Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services L. Taylor - July 12, 2000 Event Summary In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's premiere product line is their Security Vulnerability Assessment service. Market Impact By having an outside objective security Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

iron security  data privacy in network environments. Architecture Impacts Information Technology Architecture is principally driven by the need to support enterprise applications and data access. Special consideration must be given to enable personal and workgroup productivity without compromising data integrity and business continuation. Architecture design must consider at least: Workgroup file servers with backup, archive and recovery capabilities. Workgroup level firewalls to control access to sensitive data such as Read More

Voice Security Systems Inc.




iron security  Security Systems Inc. Read More

Standard & Poor's Exposes Customers' Security


Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

iron security  & Poor's Exposes Customers' Security Standard & Poor's Exposes Customers' Security L. Taylor - June 21, 2000 Event Summary Standard & Poor's (S&P), a division of McGraw-Hill, knowingly exposed their customers to information security vulnerabilities through their SPComstock analyst service. The security vulnerabilities, originally discovered in January, allowed customers to break into any other customer networks via their MultiCSP turnkey Linux box. The stock quote service, which is provided to Read More

Managing SSL Security


Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As organizations increasingly rely on SSL, the number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity.

iron security  SSL Security Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As organizations increasingly rely on SSL, the number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity. Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

iron security  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More

IT Security- What You Don't Know Can Cost You Big


In the white paper 7 essential steps to security risk reduction, you'll learn about a program that quantifies your security system's ability to han...

iron security  Security- What You Don't Know Can Cost You Big You have a network and data security system in place. But can you measure its level of effectiveness? Or its preparedness to respond to new threats? If you can't, you're flying blind, and it could cost you. Without the ability to monitor and measure the state of your security system, you're giving up the ability to truly manage it—and that could mean the difference between failure and success. In the white paper 7 Essential Steps to Security Risk Read More

Earthlink Leads the Way in DSL Security


DSL providers speed up their customers' Internet access, however, at the same time they also expose these customers to enormous security risk. Earthlink has gone the extra mile and is giving out free firewall software to all its DSL customers.

iron security  Leads the Way in DSL Security Earthlink Leads the Way in DSL Security L. Taylor - August 8, 2000 Event Summary Digital Subscriber Line (DSL) services are hot, and if you don't already have high-speed Internet access, you are wishing you did. For a small price increase over traditional ISP services, users can upgrade to a DSL line and access the Internet at record speeds. However, one of the biggest stumbling blocks to doing so has been the security implications. DSL services expose your system to Read More

Best Practices for Deploying LAN Security and NAC


Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business.

iron security  Practices for Deploying LAN Security and NAC Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business. Read More