Home
 > search for

Featured Documents related to »  network sniff


Network Associates RePositions Itself as a Security E-Village
With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside

network sniff  Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new business model, Network Associates is opening a new front door Read More...
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » network sniff


The
During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier

network sniff  instance travels over the network in the clear, and can be captured. PeopleSoft has the same issue. The original answer to TEC's questions to Dr. Peter Barth, Technology Marketing Manager for SAP AG in Walldorf, Germany, was With all the customers using SAP R/3, I have never heard this question before. We will have to investigate it further. Further investigation by Walldorf revealed the following response: SAP supports for the connection between database and application server support by security Read More...
Demystifying the EPC Global Network: An explanation of ONS, EPC-IS, and EPC-DS
As goods traverse the supply chain, various parties need to exchange information about these goods. This requires interoperability across the global network

network sniff  the development of EPCglobal Network standards (ONS, EPC-IS, EPC-DS) for sharing product movement data across multiple trading partners. When approaching RFID, many people focus first on trying to understanding the tags, readers, antennas—the obvious physical part. But if you are just able to read a tag—so what? All you have gotten is that bare minimum ID contained in the tag itself, which doesn't tell you anything. You need a means to find the information associated with that tagged object. And Read More...
Standardized Battlespace SOA: Enabling Network-centric Operations
Network-centric operations (NCO) provide the ability to leverage information networks to generate a more dynamic and agile decision-making space. A fundamental

network sniff  Battlespace SOA: Enabling Network-centric Operations Network-centric operations (NCO) provide the ability to leverage information networks to generate a more dynamic and agile decision-making space. A fundamental enabler is service-orientated architecture (SOA). The use of industry-standard IT architectures helps ensure that systems can be provisioned rapidly, shared as appropriate, and give the flexibility and response times needed within such challenging environments. Read More...
Integrated Security: A New Network Approach
The challenge is to ensure that the right people gain access and the wrong people do not, making the role of information security even more critical to enabling

network sniff  Security: A New Network Approach Executive Summary As organizations become more dependent on their networks for business transactions, external data sharing, and simple day-to-day communications, the need increases for these networks to be more accessible and operational. But as accessibility to the network becomes easier, so does gaining access to the critical data they are storing. The challenge is to ensure that the right people gain access and the wrong people do not, making the role of Read More...
One Network


network sniff  Network Read More...
Achieving Business Value with Network and Application Visibility
This white paper analyzes the return on investment (ROI) that customers can expect from their enterprise network solution, based on interviews with customers

network sniff  Business Value with Network and Application Visibility This white paper analyzes the return on investment (ROI) that customers can expect from their enterprise network solution, based on interviews with customers. Additionally, you will read about the business case for proactively managing network and application performance. Get the visibility you need to achieve your IT objectives. Download this white paper today. Read More...
The Role of Network Behavior Analysis and Response Systems in the Enterprise
Your operations and assets are under multiple points of attack, both inside and outside your network. Organizations face escalating security risks and network

network sniff  Role of Network Behavior Analysis and Response Systems in the Enterprise Your operations and assets are under multiple points of attack, both inside and outside your network. Organizations face escalating security risks and network availability requirements as they open their networks for communications and transactions with key customers, business partners, and employees. That’s why you need to ensure efficient monitoring and enhancement of your network security posture and operations. Read More...
Microsoft Business Network (MBN)--Coming of Age? Part Two: Market Impact
Microsoft Business Network (MBN) has the potential to deliver the never really (or hardly ever) realized benefits of early dot-com era Internet trading

network sniff  Business Network (MBN)--Coming of Age? Part Two: Market Impact Market Impact At the end of March, during its annual conference for North American customers, Convergence 2004 , Microsoft Corporation's (NASDAQ: MSFT) Microsoft Business Solutions ( MBS ) division previewed upcoming versions of its enterprise resource planning (ERP) and customer relationship management (CRM) solutions: MBS Axapta , MBS Great Plains , MBS Navision , MBS Solomon , Microsoft CRM , and related services. The main takeaway Read More...
Microsoft Tech Ed 2000 Win2K Attendee Network Fails Miserably
While sitting at one Windows 2000 desktop we waited a solid five minutes just to complete the logon process only to find that the wide area network speeds and

network sniff  Ed 2000 Win2K Attendee Network Fails Miserably Microsoft Tech Ed 2000 Win2K Attendee Network Fails Miserably P. Hayes - June 12, 2000 Event Summary ORLANDO, FLA Microsoft Tech Ed Conference. Microsoft Conference attendees were plagued with shared computer access issues on the Microsoft prepared and installed Windows 2000 professional Network which utilized Compaq Pentium III Deskpros. Attendees were assigned an id# and password from which they could access e-mail, conference events and web access; Read More...
BYOD Without Tears: The Impact and Challenge for Network Engineers
Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security

network sniff  Impact and Challenge for Network Engineers Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users. Read More...
Identity-based NAC: Using Identity to Put the “Control” in Network Access Control
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the

network sniff  Put the “Control” in Network Access Control Identity-Driven Access Gateways manufactured by Caymas Systems allow organizations to identify, authorize, protect and audit everyone that accesses corporate data and applications.Caymas Systems was founded in 2002 by Terence Brown and Robert Bortolotto, and ceased its operations in late 2007. Source: Caymas Systems Resources Related to Identity-based NAC: Using Identity to Put the Control in Network Access Control : Network Access Control (NAC) Read More...
GSA Schedule Partnership Gets Network-1 in the Door
Lyme Computer, a woman-owned 18 person consultancy specializing in setting strategic IT agendas and implementation services for Federal Agenices, partners with

network sniff  Schedule Partnership Gets Network-1 in the Door GSA Schedule Partnership Gets Network-1 in the Door L. Taylor - June 26, 2000 Event Summary Lyme Computer Systems, a $16 million full-service computer reseller specializing in host embedded intrusion prevention systems has formed a strategic partnership with Network-1 Security Solutions to deliver host-embedded intrusion prevention systems. Lyme, which holds a GSA and Federal Supply Schedule, caters to Federal Agencies and the educational market. Figure Read More...
Plante Moran Joins Epicor Partner Network
Epicor and Plante Moran announced a strategic alliance to deliver Epicor’s flagship enterprise resource planning (ERP) solution, Epicor ERP, to its growing

network sniff  Moran Joins Epicor Partner Network Epicor and Plante Moran announced a strategic alliance to deliver Epicor’s flagship enterprise resource planning (ERP) solution , Epicor ERP , to its growing manufacturing client base. Michigan-based Plante Moran is one of the United States’ largest accounting, tax, and consulting firms, providing services to organizations in the following industries: manufacturing and distribution, financial institutions, service, health care, private equity, public sector, and Read More...
Business Value of Network and Application Visibility
Find out in Achieving Business Value with Network and Application Visibility.

network sniff  Value of Network and Application Visibility Business Value of Network and Application Visibility Networks have become central to a company's ability to create new products and services, enter new markets, and develop new partnerships. But what are the business drivers and challenges facing network administrators? And how are companies leveraging their networks for competitive advantage? Find out in Achieving Business Value with Network and Application Visibility . In this IDC report based on a Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others