Home
 > search for

Featured Documents related to »  security commentary


Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

security commentary  Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security commentary


Adeon Software House CXInsight for Electronics V5.2.0 for Product Lifecycle Management Certification Report
CXInsight for Electronics (v5.2.0) from Adeon Software House is now TEC Certified for online comparison of discrete product lifecycle management (PLM) software

security commentary  TEC PLM Product Certification Report: CXInsight for Electronics V5.2.0,project management,cctv,data recovery,risk management,proxy server,catia,mail server,data center,data centre,home security,pro e,client server,collaboration,network security Read More
PRONTO-Xi v.670 for Mixed-mode Enterprise Resource Planning Certification Report
Pronto Software's enterprise resource planning (ERP) software, PRONTO-Xi v.670, is now TEC Certified. The certification seal is a valuable indicator for

security commentary  the added assurance of security). It is also offered as an SaaS hosted version. Information retrieval: Reporting and auditing capabilities allow users to search and track information that meet their needs and requirements. E-mail notifications: Alert intelligence and task intelligence features are provided and their settings can be easily configured by the users. Data export: A user is able to easily export data to Microsoft (MS) Excel. Reporting capabilities: The solution offers extensive reporting Read More
User-Friendliness Considerations for Enterprise Software
I just read Khoi Vinh's quacking cow dolphin post (by way of Nicholas Carr's blog) about how unfriendly he thinks enterprise software is (both posts are

security commentary  concerned primarily with stability, security and the continual justification of their jobs and staffs, enterprise software answers to few actual users. I suppose that could often be the case, but it doesn't have to be that way. I can think of at least two ways that situation doesn't have to come to pass. Get the software development process to incorporate greater open communications, as facilitated in say, an open source project, where you can gather direct feedback from a variety of users. This is more Read More
TEC Product Certification Report: Meridian Global LMS 2008.2
Meridian Knowledge Solutions’ learning management system (LMS), Meridian Global LMS 2008.2, is now TEC Certified. The certification seal is a valuable indicator

security commentary  quick response to queries. Security: The solution features the Message-Digest algorithm 5 (MD5) for cryptographic hashing, with over 20 different levels of access. Scalability: The solution has excellent scalability, and has customers with users numbering from 150 to 950,000. It offers the ability to set up multiple domains for different client groups. SumTotal Systems, Plateau, GeoLearning, and Learn.com are some of Meridian's main competitors; however, Meridian's Web 2.0 functionality is just one of Read More
Vendor Analysis: Interliant's Security Vulnerability Assessment
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to

security commentary  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More
Earthlink Leads the Way in DSL Security
DSL providers speed up their customers' Internet access, however, at the same time they also expose these customers to enormous security risk. Earthlink has

security commentary  the Way in DSL Security Earthlink Leads the Way in DSL Security L. Taylor - August 8, 2000 Event Summary Digital Subscriber Line (DSL) services are hot, and if you don't already have high-speed Internet access, you are wishing you did. For a small price increase over traditional ISP services, users can upgrade to a DSL line and access the Internet at record speeds. However, one of the biggest stumbling blocks to doing so has been the security implications. DSL services expose your system to a much Read More
IBM Announces IBM Security Intelligence with Big Data
IBM has announced IBM Security Intelligence with Big Data, an offering that combine big data analytics with security intelligence capabilities for addressing

security commentary  Announces IBM Security Intelligence with Big Data IBM has announced IBM Security Intelligence with Big Data , an offering that combine big data analytics with security intelligence capabilities for addressing both internal and external cyber security threats. The solution aims to provide a comprehensive offering for security analysts to extend their capabilities in detection and prevention. Made in IBM Labs, Security Intelligence with Big Data enables big data analysis with real-time correlation Read More
Network Associates RePositions Itself as a Security E-Village
With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside

security commentary  RePositions Itself as a Security E-Village Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new business model, Read More
New Facts on Web Security and Online transactions
Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Est...

security commentary  Facts on Web Security and Online transactions Do people easily trust your Web site enough to leave their credit card information? If not, it could be costing you—big. You need to do more to gain trust Having an SSL certificate used to be enough to satisfy customer concerns, but today you have to go much further. Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Establish Trust . You'll discover how the right Read More
Developing a Security-oriented Corporate Culture
JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative

security commentary  of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure. Read More
Arming Your Security Operations with the Right Technology and Services
This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of

security commentary  Your Security Operations with the Right Technology and Services This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of security or intrusion into data can be damaging for companies, leading to financial losses and diminished reputation. Most companies today require the implementation of a holistic security program, and a partner who is aware of the most relevant technology and service for their kind Read More
Executive Brief: Mobility, Security Concerns, and Avoidance
Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile

security commentary  Brief: Mobility, Security Concerns, and Avoidance Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy. BEGINLYX Read More
Information Security Selection


security commentary  Security Selection Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others