X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Process Manufacturing (ERP)
Process Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as...
 

 pki article


PKI and Biometrics Ready for Take-Off
Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same

pki article  Biometrics Ready for Take-Off PKI and Biometrics Ready for Take-Off L. Taylor - August 7, 2000 Event Summary With the signing of the electronic signature bill into law, TEC expects PKI and biometric products to gain momentum. The new law, signed by President Clinton on June 30th, makes electronic signatures as legal and binding as pen-to-paper signatures. PKI stands for Public Key Infrastructure, and is a technology that is used to authenticate the origin, or owner, of a file or document through the use

Read More


Public Key Infrastructure (PKI) RFI/RFP Template

PKI Functionality, PKI Technology Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Process Manufacturing (ERP)
Process Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as...

Documents related to » pki article

Using PKI to Protect Your Business Information


Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. Like ERP and CRM infrastructures, a Public Key infrastructure has become an enabler of business objectives. PKI provides a systematic approach to information security.

pki article  PKI to Protect Your Business Information Using PKI to Protect Your Business Information Arash Nejadian - December 24, 2003 Executive Summary As organizations evolve, they require new business models to become more efficient or to simply survive in this electronic age. Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. The value of intellectual property has skyrocketed and the need to protect it has become more critical. Read More

Symantec Swallows AXENT; Takes on Network Associates


Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

pki article  when it comes to PKI development, Protocol Analyzers, and Vulnerability Assessment products. However, if Symantec gobbled up ISS, a PKI vendor, and a competing protocol analyzer tool, Network Associates could be in for a head-on collision with Symantec. The Symantec AXENT firewall beats Gauntlet by a long shot, and on the virus front, they are probably neck and neck. So what does this mean for users? If you're looking for a PKI tool or protocol analyzer, you're still better off calling Network Read More

Expect Boom in Electronic Signatures


E-Pad deployment will skyrocket and make your fax machine obsolete. But don't expect all security experts to embrace electronic signatures as PKI solutions continue to be deployed. Nonetheless, even if electronic signatures are arguably less secure than PKI, less than optimal embedded security on E-pads will not likely affect the demand.

pki article  of installing and administering PKI through-out large organizations, coupled with fast growing presence of pen-based devices on the market, electronic handwritten signatures are sure to gain popularity. Current trends indicate a 90% probability that digital E-Pads will gain mainstream popularity in the next 24 months. This past July, the U.S. Congress became an early adopter of electronic signature technology, giving its stamp of approval, when they signed the Year2000 Readiness and Responsibility Act Read More

The "S" in SAP Doesn't Stand for Security (that goes for PeopleSoft too)


During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier architecture. SAP has revealed that they expect the database or third party products to handle security between the application server and the database server. If the client does not take these extra measures, the master password for the SAP database instance travels over the network in the clear, and can be captured. PeopleSoft has the same issue.

pki article  by various means (e.g., PKI infrastructure). SAP states that their Secure Network Communications Interface (BC-SNC) has the following certified interfaces: CyberSafe (TrustBroker Security Solution for R/3), Entrust/PKI, Platinum Technology (Computer Associates) Single Sign On, Seclude Sicherheitstechnologie Informationssysteme Seclude for R/3, and Security Dynamics Technology Keon Agent for R/3. They state SAP has decided not to include cryptographic modules in its own software. Instead, external Read More

Is Your Enterprise Application on a Road to Nowhere?


Consolidation is a well-documented trend and is to be expected in the market for enterprise applications. This article outlines the evolution of the enterprise software market. Specifically, it focuses on the revolutionary technology known as service-oriented architecture (SOA).

pki article  Your Enterprise Application on a Road to Nowhere? Originally published - December 22, 2006 Your business changes continuously. You add and drop service or product lines. Your customers demand new and challenging levels of flexibility or integration with their operations. New laws and regulations require that you track more and more data on your operations in highly specific formats. And there is the relentless demand to increase operational efficiency and product quality year after year while reducing Read More

Plex Systems Replaces Seven Silo Applications At CCI


I recently read an article about the implementation and go-live experience of an enterprise resource planning (ERP) solution at a relatively small metal-forming manufacturing company called Clips and Clamps Industries (CCI). This Plymouth, Michigan–based family-owned company is a metal stamping supplier to the automotive industry and produces a variety of custom-made items for its industrial

pki article  Systems Replaces Seven Silo Applications At CCI I recently read an article about the implementation and go-live experience of an enterprise resource planning (ERP) solution at a relatively small metal-forming manufacturing company called Clips and Clamps Industries (CCI). This Plymouth, Michigan–based family-owned company is a metal stamping supplier to the automotive industry and produces a variety of custom-made items for its industrial customers. The business flow therefore involves many Read More

Upside Software Remains on the Upside of the Contract Management Market


My recent article entitled “Why Should Enterprises Manage their Contracts Closely?” analyzed the importance of enterprise-wide contract lifecycle management (CLM) solutions and stated that many enterprises still use inappropriate makeshift tools to manage their important contractual terms and conditions. The article concluded with the fact that enterprise resource planning

pki article  Software Remains on the Upside of the Contract Management Market My recent article entitled “Why Should Enterprises Manage their Contracts Closely?” analyzed the importance of enterprise-wide contract lifecycle management (CLM) solutions and stated that many enterprises still use inappropriate makeshift tools to manage their important  contractual terms  and conditions. The article concluded with the fact that  enterprise resource planning (ERP)  systems handle transactional details of an Read More

Talking to an Emptoris Exec Post-Empower 2011 (and Pre-IBM 2012)


I recently published a TEC article about my attendance of Emptoris’ Empower 2011 user conference this past fall. What follows now is my deep-dive interview with Terrence Curley, Senior Vice President (SVP) of Product Strategy and Development at Emptoris, with the idea of developing some of the main messages from the conference. During this past year, with the acquisition of Rivermine

pki article  to an Emptoris Exec Post-Empower 2011 (and Pre-IBM 2012) I recently published a TEC article about my attendance of Emptoris’ Empower 2011 user conference  this past fall. What follows now is my deep-dive interview with Terrence Curley, Senior Vice President (SVP) of Product Strategy and Development at Emptoris, with the idea of developing some of the main messages from the conference. During this past year, with the acquisition of Rivermine , the telecom expense management (TEM) solution Read More

The Demo Crime Files!


This article is part of the continuing education all software demonstrators need to ensure their fundamental skills remain sharp. It points out three common “crimes” made in demonstrations, how to recognize them, and suggests alternative approaches.

pki article  Demo Crime Files! Originally published - November 7, 2001 Please forgive me. I'm normally optimistic and maintain a positive outlook. This article, however, is devoted to the negative aspects of demonstrations. It's important to point out the common crimes made in demonstrations because most people don't recognize them. Just like in real life, some crimes are minor offenses while others carry the death penalty. I'm not suggesting any demo crime is acceptable. Crimes aren't acceptable in society, nor Read More

Business Process Analysis versus Business Process Management


Business process analysis (BPA) vendors are trying to enter the business process management (BPM) market by marketing themselves as BPM solutions. This article discusses the differences between BPA and BPM vendors, and examines the benefits of each.

pki article  Process Analysis versus Business Process Management Talking to end users reveals that there is confusion in the market regarding business process analysis (BPA) and business process management (BPM) suites. Vendors use the term BPM in a very broad way, but what are really the differences between BPA and BPM, and where does BPM come from? BPM in the Early Stages In the 1980s, organizations used business process redesign (BPR) to improve productivity, quality of service, and cost effectiveness by Read More

Enterprise Software Conferences: Why Bother?


If you did not get the chance to read the article about the 2009 APICS Conference, I thought I should share with you some of the things we (Khudsiya and I) did or learned there. I thought I would start by imagining a conversation about imaginary analysts, between two imaginary people, in an imaginary kitchen of an imaginary company: Imaginary man (IM): “Where did G the analyst go

pki article  Software Conferences: Why Bother? If you did not get the chance to read the article about the 2009 APICS Conference , I thought I should share with you some of the things we (Khudsiya and I) did or learned there. I thought I would start by imagining a conversation about imaginary analysts, between two imaginary people, in an imaginary kitchen of an imaginary company: Imaginary man (IM): “Where did G the analyst go? I haven’t seen him around for at least a couple of days!” Imaginary woman Read More

Maximizing Potential Benefits in Reverse Auctions


Reverse auction (RA) has emerged as a strategic tool for consumer packaged goods companies pursuing cost efficiencies in their sourcing programs. This article presents a framework to structure and gain maximum mileage out of the RA process.

pki article  reverse auction,RA,consumer packaged goods,CPG,e-auctions,e-purchasing application,e-sourcing purchases,cost of goods sold,COGS,sourcing,pre-auction quotation,request for quotation,RFQ,transparency,FMCG Read More

Demystifying SAP Solution Manager


Many large organizations are struggling to manage all their software systems—let alone the different software versions across departments. In his article, TEC principal analyst P.J. Jakovljevic discusses how SAP Solution Manager, a unique offering for centralized support and system management, covers all aspects of system deployment, operations, and continuous improvement, to ease customer pain with their complex IT environment.

pki article  SAP Solution Manager This past decade has seen the advent of SAP Solution Manager , a unique offering for centralized support and system management. Needless to say, a typical SAP system landscape at global corporations may include a large number of SAP and non-SAP systems. “Complex” SAP environments (or heterogeneous IT landscapes) often comprise huge global corporations that use SAP ERP worldwide, with different divisions possibly using different releases of the product (which is a Read More

LeveragePoint Adds Value to B2B Pricing - Part 1


TEC’s in-depth 2011 article not only described the opportunities inherent in the business to business (B2B) pricing software market, but also ascertained that the value of this budding software category has yet to become universally known and appreciated. Sensing the opportunity, LeveragePoint is the latest market newcomer with a fresh approach to deal pricing negotiations.

pki article  Adds Value to B2B Pricing - Part 1 TEC’s in-depth  2011 article not only described the opportunities inherent in the business to business (B2B) pricing software market, but also ascertained that the value of this budding software category has yet to become universally known and appreciated . Sensing the opportunity, LeveragePoint is the latest market newcomer with a fresh approach to deal pricing negotiations. LeveragePoint was established in January 2009 as a spinout from Monitor Group , Read More