X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 securing internet protocol


Complete Guide for Securing MPLS Networks
The supply of multiprotocol label switching (MPLS) services and service providers has grown exponentially with the demand for Internet protocol (IP) and

securing internet protocol  Guide for Securing MPLS Networks The supply of multiprotocol label switching (MPLS) services and service providers has grown exponentially with the demand for Internet protocol (IP) and Ethernet services. But while MPLS enhances packet processing speed and network performance, it lacks in security. As government and industry compliance regulations increase, organizations must invest in tools that can ensure security without affecting network performance.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » securing internet protocol

Creating a Winning Data Transmission Service


Today’s data transmission departments are battling for budget and relevance. Moving files and ensuring delivery is getting tougher every day. To successfully deliver data to an increasing number of target platforms and meet rising customer expectations, leading companies are adopting service-oriented architectures (SOAs) and upgrading their file transfer departments into data transmission services. Find out more.

securing internet protocol  an application proxy for securing file transfers across the Demilitarized Zone (DMZ) . This allows companies to safely use the Internet to move business critical files using a variety of file transfer protocols including Connect:Direct, FTP, HTTP, and SSH. Multi-factor authentication, protocol inspection, command filtering, and session break are key capabilities provided by Sterling Secure Proxy for securing B2B file transfers. Sterling Secure Proxy integrates with both Connect:Direct and Gentran Read More

The AS/400 Takes You Securely Where You Want to Go


This article on the built-in security features of the AS/400 system originally appeared in the Midrange Computing’s Showcase Magazine, June 2000.

securing internet protocol  well the merchant is securing their credit card data on their own internal infrastructure. Since SSL has no way of assuring that the merchant is authorized to accept credit card payments, there is no implied security verifiable with the merchant. A SET merchant needs to register with a financial institution and setup communications with a bank which does require additional overhead. SET, like SSL, can slow down transactions, however, with multiple crypto accelerators on the market that can speed up Read More

Magic Quadrant for B2B Gateway Providers


Business-to-business (B2B) gateway solutions have matured to the point where they can support a wide range of projects. However, there are still functional differences—including product maturity, service-oriented architecture (SOA) enablement, architectural coherence, and community management—among competing solutions. Find out who the leaders, challengers, visionaries, and niche players are in the B2B gateway market.

securing internet protocol  lines or frame relays. Securing the data via encryption. This includes the use of digital certificates and standards, such as Pretty Good Privacy (PGP) . The B2B gateway must be able to integrate with thirdparty certificate authorities, handle X.509 certificates, and deal with revocations and expired credentials. Accessing control from an external mechanism (LDAP, Active Directory and enterprise asset management tools) or an internal (to the B2B gateway) application. In addition to security Read More

Check Point Leads Firewall Market


With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.

securing internet protocol  the worldwide leader in securing the Internet. In line with that, Check Point has done a nice job of securing itself as market leader in firewall products. Though a firewall alone cannot guarantee that your website or network will not be broken into, if configured correctly it can certainly reduce the risk by a large margin. Check Point's FireWall-1 product is undoubtedly their most popular and sought after product. FireWall-1 is a carrier class product, and is used as the basis of a Managed Firewall Read More

The Benefits of CRM Internet Architecture


One of the most important aspects of any business management application, including CRM applications, is its underlying architecture. An application’s customizability, adaptability, portability, scalability, and extensibility are all functions of its architecture. A well-designed architecture will thus accommodate growth and adapt to business changes—without affecting the performance of the application or requiring an exhaustive re-implementation.

securing internet protocol  Benefits of CRM Internet Architecture One of the most important aspects of any business management application, including CRM applications, is its underlying architecture. An application’s customizability, adaptability, portability, scalability, and extensibility are all functions of its architecture. A well-designed architecture will thus accommodate growth and adapt to business changes—without affecting the performance of the application or requiring an exhaustive re-implementation. Read More

Oracle Applications - An Internet-Reinvented Feisty Challenger


It is startling how much has changed in Oracle’s applications business during the last two years. Oracle is indisputably the most reformed applications vendor, having achieved significant growth in total revenue, license revenue and net income. Oracle has a head start on most of its competition pertaining to Internet applications, and the Company still leads the ERP pack both on product technology vision and execution. However, the future will by no means be without serious challenges.

securing internet protocol  Applications - An Internet-Reinvented Feisty Challenger Oracle Applications - An Internet-Reinvented Feisty Challenger P.J. Jakovljevic - September 19, 2000 Vendor Summary Founded in 1977 and headquartered in Redwood City, CA, Oracle Corporation is still the No.1 database software vendor, and is the world's second largest independent software company (after Microsoft). Oracle is also the second largest enterprise applications vendor (after SAP) with $2.7 billion revenue in its fiscal 2000 (slightly Read More

Case Study: Securing Servers, Oracle Databases, and Embedded Systems in a Health Care Environment


A non-profit hospital needed to protect its critical clinical systems without either interrupting system availability or overloading the small IT security team. The hospital had to overcome several vulnerabilities, such as the fact that some clinical systems could not be patched due to Food and Drug Administration (FDA) regulations. Find out how a server security solution helped the hospital address these challenges.

securing internet protocol  Study: Securing Servers, Oracle Databases, and Embedded Systems in a Health Care Environment A non-profit hospital needed to protect its critical clinical systems without either interrupting system availability or overloading the small IT security team. The hospital had to overcome several vulnerabilities, such as the fact that some clinical systems could not be patched due to Food and Drug Administration (FDA) regulations. Find out how a server security solution helped the hospital address these chall Read More

Oracle Co. - Internet Paradigm Boosts Applications Growth


Oracle is one of the first software companies to implement the Internet computing model for developing and deploying enterprise software across its entire product line. CRM and strategic procurement will be significant contributors to Oracle Applications sales revenue (up to 35% within next 3 years), where Oracle Business OnLine has a potential of reaching 15%-25% of total Oracle applications sales revenue within the next 5 years...

securing internet protocol  Co. - Internet Paradigm Boosts Applications Growth Vendor Summary Founded in 1977 and headquartered in Redwood City, CA, Oracle Corporation is the No.1 database software vendor with approx. 50% market share, and is the world's second largest independent software company (after Microsoft). Oracle is also the second largest ERP vendor (after SAP) with $2.1 billion revenue in 1998 (approx. 12% of global ERP market), and 6000 installations worldwide. It maintains a presence in 145 countries, with more Read More

Andersen Consulting to Grab a Piece of the Internet Pie


Andersen Consulting has announced plans to deploy $1 billion of its privately-held wealth for the purpose of providing venture capital to Internet start-ups.

securing internet protocol  Consulting to Grab a Piece of the Internet Pie Andersen Consulting to Grab a Piece of the Internet Pie S. McVey - December 15th, 1999 Event Summary Andersen Consulting recently announced plans to deploy $1 billion of its privately-held capital to foster growth in web start-ups and new technology companies. Up to half of the stake will be in cash and half in access to intellectual property. The new venture will operate from Silicon Valley, home of Andersen's research facility in Palo Alto, CSTaR Read More

Acer to Jump on Internet Appliance Bandwagon


Computer maker Acer is planning to launch a line of Internet appliances at next month's Consumer Electronics Show, in Las Vegas, according to a company source.

securing internet protocol  to Jump on Internet Appliance Bandwagon Event Summary December 27, 1999 (ZDNet) - In the latest example of PC companies trying to cash in on the supposed post-PC era of Internet devices, computer maker Acer is planning to launch a line of Internet appliances at next month's Consumer Electronics Show, in Las Vegas, according to a company source. Acer's new products will include the I-Station, a simplified computer based on Microsoft's Web Companion software that connects to Microsoft's MSN service. Read More

2010 Application Delivery Networking Challenge: Accelerating, Securing, Optimizing, and Monitoring Applications


Over the past seven years, wide-area network (WAN) optimization has transformed from an interesting point product that solved isolated problems into a strategic cornerstone of enterprise application delivery strategy. Not surprisingly, during this time, WAN optimization evolved to meet a growing set of customer needs. Learn how WAN optimization has evolved into a complete model of enterprise IT performance.

securing internet protocol  Delivery Networking Challenge: Accelerating, Securing, Optimizing, and Monitoring Applications Over the past seven years, wide-area network (WAN) optimization has transformed from an interesting point product that solved isolated problems into a strategic cornerstone of enterprise application delivery strategy. Not surprisingly, during this time, WAN optimization evolved to meet a growing set of customer needs. Learn how WAN optimization has evolved into a complete model of enterprise IT performance. Read More

PhoneFish.com to Offer E-mail for Wireless Access Phones


PhoneFish is a two-way wireless Internet solution for small to medium sized businesses, which require consistent wireless access to POP-based email.

securing internet protocol  com to Offer E-mail for Wireless Access Phones Event Summary BLUE BELL, Penn.--(BUSINESS WIRE)--PhoneFish.com, a leading provider of wireless Internet solutions, announced PhoneFish, a wireless Internet e-mail service specifically designed for Web-enabled phones' users to access e-mail accounts provided by most Internet service providers (ISP's). Market Impact PhoneFish is a two-way wireless Internet solution for small to medium sized businesses, which require consistent wireless access to POP-bas Read More

The Challenge of Securing Servers in a Health Care Environment


Server security is a key issue for the health care industry. Between an expanding body of regulations and the need for 24/7/365 system availability, it’s essential to address vulnerabilities as soon as possible. But with constant new threats, protecting your server isn’t easy. Learn about the special needs of server security in the health care environment, and how you can have comprehensive protection with no down time.

securing internet protocol  Challenge of Securing Servers in a Health Care Environment Server security is a key issue for the health care industry. Between an expanding body of regulations and the need for 24/7/365 system availability, it’s essential to address vulnerabilities as soon as possible. But with constant new threats, protecting your server isn’t easy. Learn about the special needs of server security in the health care environment, and how you can have comprehensive protection with no down time. Read More

Superhighway at the Crossroads: The Evolution of Internet Service Provision


The Internet has grown from mainly academic and military use into a global, integrated, and sophisticated commercial utility. Not just an “information superhighway,” it now offers voice telephony, video, and mobile communications in a converged network. Connection services have expanded, and Internet service providers (ISPs) are adding value. Explore the challenges and opportunities—and find out what lies ahead.

securing internet protocol  at the Crossroads: The Evolution of Internet Service Provision The Internet has grown from mainly academic and military use into a global, integrated, and sophisticated commercial utility. Not just an “information superhighway,” it now offers voice telephony, video, and mobile communications in a converged network. Connection services have expanded, and Internet service providers (ISPs) are adding value. Explore the challenges and opportunities—and find out what lies ahead. Read More