X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security commentary


Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

security commentary  Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security commentary

User-Friendliness Considerations for Enterprise Software


I just read Khoi Vinh's quacking cow dolphin post (by way of Nicholas Carr's blog) about how unfriendly he thinks enterprise software is (both posts are generating insightful commentary). Vinh makes a point about enterprise applications not receiving the same sort of wide-spread critiques that popular commodity applications do. He attributes this to the idea that the software is used by a less

security commentary  concerned primarily with stability, security and the continual justification of their jobs and staffs, enterprise software answers to few actual users. I suppose that could often be the case, but it doesn't have to be that way. I can think of at least two ways that situation doesn't have to come to pass. Get the software development process to incorporate greater open communications, as facilitated in say, an open source project, where you can gather direct feedback from a variety of users. This is more Read More

Lombardi Software Teamworks 7.0 for Business Process Management Certification Report


Lombardi Software's business process management (BPM) system, Teamworks 7.0, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC’s research services for assistance with their software selection projects. Download this 28-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary  Outlook Plug-in | BPM Security and Control | BPM Well-defined Standard of Accuracy | BPM Role and User Definition | Business Process Management Audit Trail | BPM Data Access | BPM Whitepapers | Business Process Management Whitepapers | BPM Audit Trail | BPM Software Providers | BPM System Vendors | Business Process Management pdf | BPM Real Time Control | Business Process Management Innovation | BPM Process Server Registry | Best BPM Software | Bpel BPM | Bpel BPM | BPM Architecture | Business-LED Process Read More

PRONTO-Xi v.670 for Mixed-mode Enterprise Resource Planning Certification Report


Pronto Software's enterprise resource planning (ERP) software, PRONTO-Xi v.670, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC's research services for assistance with their software selection projects. Download this 39-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary  the added assurance of security). It is also offered as an SaaS hosted version. Information retrieval: Reporting and auditing capabilities allow users to search and track information that meet their needs and requirements. E-mail notifications: Alert intelligence and task intelligence features are provided and their settings can be easily configured by the users. Data export: A user is able to easily export data to Microsoft (MS) Excel. Reporting capabilities: The solution offers extensive reporting capab Read More

Adeon Software House CXInsight for Electronics V5.2.0 for Product Lifecycle Management Certification Report


CXInsight for Electronics (v5.2.0) from Adeon Software House is now TEC Certified for online comparison of discrete product lifecycle management (PLM) software in TEC's Evaluation Centers. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

security commentary  TEC PLM Product Certification Report: CXInsight for Electronics V5.2.0,project management,cctv,data recovery,risk management,proxy server,catia,mail server,data center,data centre,home security,pro e,client server,collaboration,network security Read More

The 7 Habits of Highly Effective Security


You know your organization needs to be proactive about security, but you don't know what that means. You’re a busy executive and you need your security agenda summed up in a nutshell, but you know nothing about information security. What "to do" list should you give your CIO?

security commentary  Habits of Highly Effective Security The 7 Habits of Highly Effective Security L. Taylor - June 6, 2000 Event Summary With cybercrime on the rise, it is important for organizations to make sure that protecting their vital information and assets, and their customers, is not getting overlooked. Sometimes it is the most basic security procedures that are overlooked, e.g,. the utilization of safe, encrypted passwords. Market Impact If every minute of downtime costs $10,000 [1], how can your organization Read More

Information Security Selection




security commentary  Security Selection Read More

SECNAP Network Security Corp


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

security commentary  Network Security Corp Read More

e-DMZ Security


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

security commentary  DMZ Security Read More

Intrusion Detection and Security Auditing In Oracle


Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead.

security commentary  Detection and Security Auditing In Oracle Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead. Read More

Emerging Security Threats Demand Comprehensive Infrastructure Monitoring


A multibillion-dollar crime industry is changing the security landscape. Cyber-theft of intellectual property, customer data, and money is on the rise—directly impact¬ing corporation’s bottom lines. To stay ahead of these targeted attacks, you need a comprehensive view of point secu¬rity solutions and infrastructure monitoring tools—without the cost-prohibitive labor hours involved in manual log analysis or proprietary aggregation tools.

security commentary  Security Threats Demand Comprehensive Infrastructure Monitoring A multibillion-dollar crime industry is changing the security landscape. Cyber-theft of intellectual property, customer data, and money is on the rise—directly impact¬ing corporation’s bottom lines. To stay ahead of these targeted attacks, you need a comprehensive view of point secu¬rity solutions and infrastructure monitoring tools—without the cost-prohibitive labor hours involved in manual log analysis or proprietary Read More

Internet Security and Acceleration Server


Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth resources.  

security commentary  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth resourc Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

security commentary  & Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

security commentary  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More

Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough


Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective.

security commentary  a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective. Read More