Home
 > search for

Featured Documents related to »  security case study


Case Study: Security Benefit
Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For

security case study  Study: Security Benefit Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data. Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security case study


Case Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops
Learn how IT asset tracking tools helped Allina Hospitals and Clinics monitor 2,700 computers on and off their network without having to invest in additional

security case study  Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops Allina Hospitals & Clinics Manage Laptops ; Prevent Data Breaches with Computrace If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking&8482; solutions. Absolute Software provides individuals and organizations of all types and sizes with Read More...
Case Study: Terumo
Terumo Cardiovascular Systems, global manufacturer and distributor of medical products, has more than 1,500 finished goods, many of which are assembled in one

security case study  Risk | Supply Chain Security | Supply Chain Services | Supply Chain Software | Supply Chain Solutions | Supply Chain Sourcing | Supply Chain Strategy | Supply Chain Technology | Supply Chain Tools | Supply Chain Training | Supply Chain Value | Supply Chain Visibility | Business Supply Chain | Global Supply Chain | Improve Supply Chain | Industry Supply Chain | Integrated Supply Chain | Lean Supply Chain | Managing Supply Chain | Manufacturing Supply Chain | Retail Supply Chain | Strategic Supply Chain | Read More...
Case Study: Diebold
Based in Canton, Ohio (US), Diebold provides automatic teller machines (ATMs), security systems, and integrated self-service solutions for the financial and

security case study  automatic teller machines (ATMs), security systems, and integrated self-service solutions for the financial and retail industries. To accelerate technician training and assure regulatory compliance, Diebold integrated a learning management system (LMS) within its Oracle environment. Learn how Diebold’s solution reduced technicians’ speed-to-competency from 18 months to just 4. Read More...
Case Study: NumeriX
Since 1996, NumeriX had been using in-house-developed licensing tools to manage and protect its applications. In 2006, it outsourced licensing to a third-party

security case study  have strict privacy and security requirements.. In many instances, absolutely no Internet access is permitted from the customers' internal networks, while in other cases, external network communication is restricted through often-proprietary HTTP proxy-server-based firewalls and DMZ's. This poses a challenge for managing product activation. An Internet-based licensing system has to provide an easy way for users worldwide to obtain licenses even when they have no Internet access from their systems. At the Read More...
Understanding the PCI Data Security Standard
The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a

security case study  the PCI Data Security Standard MessageLabs Hosted Web Security and Content Filtering service operates at the Internet level, intercepting viruses, and spyware. Source : MessageLabs | Now part of Symantec Resources Related to Understanding the PCI Data Security Standard : Payment Card Industry Data Security Standard (PCI DSS) (Wikipedia) Understanding the PCI Data Security Standard Data Security is also known as : Data Security Architecture , Data Security Articles , Data Security Audit , Read More...
Vendor Analysis: Interliant's Security Vulnerability Assessment
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to

security case study  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More...
Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security
Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace

security case study  to Assist in eBusiness Security Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security Featured Author -  Laura Taylor - February 16, 2002 Users Fail To Understand The Technology Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security woes, new technologies are often unleashed and implemented before due diligence Read More...
Network Security Management
In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’

security case study  Security Management In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More...
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

security case study  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More...
Network Associates RePositions Itself as a Security E-Village
With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside

security case study  RePositions Itself as a Security E-Village Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new business model, Read More...
TCO & Security of Enterprise Grade Mobility
While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read

security case study  & Security of Enterprise Grade Mobility While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management. Read More...
Case Study: Widex
Widex Canada, a manufacturer and distributor of high-end hearing aids, wanted to automate its work flow@from sales order entry through shipping and delivery. It

security case study   Read More...
Institute for Applied Network Security (IANS)
The Institute for Applied Network Security (IANS) conducts and publishes research and analysis. IANS also holds forums and peer-based roundtable discussions.

security case study  for Applied Network Security (IANS) The Institute for Applied Network Security (IANS) conducts and publishes research and analysis. IANS also holds forums and peer-based roundtable discussions. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others