X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security commentary


Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

security commentary  Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security commentary

TEC Product Certification Report: Meridian Global LMS 2008.2


Meridian Knowledge Solutions’ learning management system (LMS), Meridian Global LMS 2008.2, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC’s research services for assistance with their software selection projects. Download this 23-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary   Read More

PRONTO-Xi v.670 for Mixed-mode Enterprise Resource Planning Certification Report


Pronto Software's enterprise resource planning (ERP) software, PRONTO-Xi v.670, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC's research services for assistance with their software selection projects. Download this 39-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary   Read More

User-Friendliness Considerations for Enterprise Software


I just read Khoi Vinh's quacking cow dolphin post (by way of Nicholas Carr's blog) about how unfriendly he thinks enterprise software is (both posts are generating insightful commentary). Vinh makes a point about enterprise applications not receiving the same sort of wide-spread critiques that popular commodity applications do. He attributes this to the idea that the software is used by a less

security commentary   Read More

Lombardi Software Teamworks 7.0 for Business Process Management Certification Report


Lombardi Software's business process management (BPM) system, Teamworks 7.0, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC’s research services for assistance with their software selection projects. Download this 28-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary   Read More

Focus Experts Guide to IT Security: Unified Threat Management


Find out in Focus Experts Guide to IT Security: Unified Threat Management.

security commentary   Read More

People’s Role in Cyber Security: Academics’ Perspective


With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities. To examine the extent to which human factors can contribute to either preserving security standards or bringing risk to company data, the whitepaper outlines the most common employee-caused security issues in the corporate ecosystem.

security commentary   Read More

Developing a Security-oriented Corporate Culture


JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure.

security commentary   Read More

Integrated Security: A New Network Approach


The challenge is to ensure that the right people gain access and the wrong people do not, making the role of information security even more critical to enabling today’s businesses. An integrated security approach offers the most effective security posture.

security commentary   Read More

Case Study: Security Benefit


Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data.

security commentary   Read More

E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services


In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's lead product line is their Security Vulnerability Assessment service.

security commentary   Read More