Home
 > search for

Featured Documents related to »  security feature


Need for Content Security
The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best

security feature  you use other Content Security software. Softwareâ€s like eScan are intelligent enough to translate the IP to its URL and block it. Filter Category: The software should allow you to create category of filters for block and allow site. Sites related to the category can be listed there. For e.g. Pornography Category will have sites related to porn and all sites for this category are blocked. It should be possible to add or remove sites from block and allow category with a mouse click. Log Files: The Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security feature


Sendmail, Inc. and Disappearing, Inc. Team Up to Add Enhanced Security
Administrators of the sendmail system, coupled with Disappearing, Inc.'s product will be able to set specific

security feature  Up to Add Enhanced Security Event Summary INDIAN WELLS, Calif.--(BUSINESS WIRE)-- Sendmail, Inc., the provider of the ubiquitous Sendmail(R) Internet Mail platform for e-communications, applications and services, announced a new technology partnership with Disappearing Inc., creators of the Disappearing Email solution. Disappearing Email protects the privacy of email by automatically destroying each message after a certain length of time, as determined by corporate policy. The partnership will allow Read More...
Product Review: GFI's LANguard Network Security Scanner
Performing patch management is one of the most tedious chores that must be completed by network administrators. While there are many patch management tools

security feature  other types of potential security vulnerabilities. The nice part about this feature is that you don't have to do any extra work to perform a full-blown security scan against your network. When you scan your network for missing patches, GFI LANguard will also check for things like open shares, open ports, and unused user accounts. The software also checks for security vulnerabilities related to audit policies, password policies, user accounts, groups, and computers. When the scan is complete, GFI LANguard Read More...
4 Key Steps to Automate IT Security Compliance
An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and

security feature  external regulations and internal security policies. The solution should provide a continuous, automated view of host configuration with data updated on every host scan. Generate reports that support each compliance team s needs, including compliance metrics and audit results. All reports should draw upon one data set for all compliances, ensuring consistency and completeness. Issue and track service tickets to ensure that issues are promptly reported to and resolved by the appropriate asset owners. This Read More...
E*Trade Ignores Private Security Warning, But Public Hullaballoo Gets Response
E*Trade was notified about a cookie vulnerability in August, but the correction wasn't made until after the problem became public.

security feature  reports of any customer's security having actually been violated. The problem centers around a feature of the site that lets users store their passwords in a cookie on their own PC; such cookies expire after six months. The encryption technique used for the passwords is a weak one. While appropriate for many sites this weak encryption seems to TEC and others as inappropriate for a site that enables large financial transactions. The problem is exacerbated by the existence of a well-known security Read More...
Making Gramm-Leach-Bliley Security Compliance Fast and Easy
Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial

security feature  Gramm-Leach-Bliley Security Compliance Fast and Easy Making Gramm-Leach-Bliley Security Compliance Fast & Easy If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Qualys® is headquartered in Redwood Shores, California, with offices in France, Germany, the U.K., Japan and Hong Kong, and has partners worldwide. Source : Qualys Resources Related to Security Compliance : Regulatory Compliance (Wikipedia) Making Gramm-Leach-Bliley Read More...
Intrusion Detection and Security Auditing In Oracle
Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of

security feature  Detection and Security Auditing In Oracle Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead. Read More...
eCLIPse, Encryption Security Solution
eCLIPse Enterprise Security Solution is an encryption software security solution for any business that requires frequent exchange of secure encrypted data

security feature  Encryption Security Solution eCLIPse Enterprise Security Solution is an encryption software security solution for any business that requires frequent exchange of secure encrypted data. eCLIPse provides safe transfer of confidential data to and from authorized external resources and prevents unauthorized viewing. Security is managed by smart-card technology (smart-card chip fitted into a USB token). Using simple and physically secure USB tokens, eCLIPse functions at the National Institute of Read More...
Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to

security feature  Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle. Read More...
Integrated Security: A New Network Approach Part Two: The Shift Toward Integration
This part describes the key elements and benefits of an integrated security solution in comparison to current security solutions.

security feature  With nearly 400 computer security vendors offering solutions spanning the spectrum from antivirus to firewalls, content filtering to intrusion detection, we're led to ask, Why? The problem lies in the old world strategy of one threat, one cure. Companies finding themselves marauded by the onslaught of attacks have simply added more single-cure security point product after another, and dealt with the cost and difficulties of trying to manage them with limited resources, finding out in the end that Read More...
Mobile Access Security & Management
The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been

security feature  Access Security & Management The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been further complicated by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices. Read More...
Financial Mobility-Balancing Security and Success
No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government

security feature  Mobility-Balancing Security and Success No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more. Read More...
Selecting Your Hosted Security Service Provider: What Every IT Manager Needs to Know
Do-it-yourself (DIY) security can be daunting. It requires significant time, effort and expertise to maintain strong security while complying with information

security feature  Your Hosted Security Service Provider: What Every IT Manager Needs to Know Symantec Hosted Services uses the power of cloud computing to secure and manage information stored on endpoints and exchanged through email, Web, and IM interactions. Our hosted security services help protect against viruses, spam, spyware, phishing, DDOS attacks, directory harvest attacks, data leaks, and other organization-damaging threats. Source: Symantec Resources Related to Selecting Your Hosted Security Service Read More...
Standard & Poor's Exposes Customers' Security
Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

security feature  & Poor's Exposes Customers' Security Standard & Poor's Exposes Customers' Security L. Taylor - June 21, 2000 Event Summary Standard & Poor's (S&P), a division of McGraw-Hill, knowingly exposed their customers to information security vulnerabilities through their SPComstock analyst service. The security vulnerabilities, originally discovered in January, allowed customers to break into any other customer networks via their MultiCSP turnkey Linux box. The stock quote service, which is provided to customers Read More...
Standard & Poor's Announces Security Certification
After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

security feature  & Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others