X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security identifier


SAP RFID Technology in the Automotive Industry
By using radio frequency identification (RFID) technology, automotive companies can eliminate material shortfalls of containers, which lead to delivery delays

security identifier  as needed. Increased Process Security Companies can gain several benefits when they implement an RFID solution for production and logistics processes. For example, they can reduce the time it takes to process orders, and they can keep less stock on hand with improved visibility and material ordering processes. The ability to seamlessly track reusable assets, such as containers and returnable packaging, in the transport and delivery processes ensures greater process security while lowering operating

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security identifier

The Future of Secure Remote Password (SRP)


The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Yet the industry de-facto standard remains the password-based authentication scheme. This article explores the possibilities for SRP in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

security identifier   Read More

Scala Shows Far More Than A Bit Of A Backbone Part 2: Market Impact


Scala is a serious challenger in the SME market, especially in emerging markets like Central and Eastern Europe, Middle East and China (possibly the local market leader therein), given that the company reported growth and stable financial performance in 2001 while many of its peers have seen corresponding decline.

security identifier   Read More

Taking Stock of TAKE Supply Chain Solutions - Part 2


Part 1 of this blog series introduced TAKE Supply Chain, a supply chain management (SCM) division of TAKE Solutions, Ltd. The TAKE Solutions parent company is a global technology solutions and service provider, with significant focus across two principal business areas – life sciences and SCM, with an almost even breakdown of revenues between these divisions (the company is

security identifier   Read More

I Know What You Did Last Week - But I'll Never Tell


Internet advertising is under attack from privacy advocates and private citizens as DoubleClick reveals that it can correlate surfing behavior with individual identities. DoubleClick points out that this is only possible when the personal identification is provided voluntarily. Opponents question whether the average surfer understands the implications of providing information.

security identifier   Read More

Information Security Selection Software Evaluation Report


Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions.

security identifier   Read More

e-DMZ Security


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

security identifier   Read More

Cost Effective Security and Compliance with Oracle Database 11g Release 2


Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read this white paper for more.

security identifier   Read More

Network Security Best Practices: Competitive Analysis


When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services for Internet protocol (IP) networks are emerging that enable new levels of scalability and manageability—while remaining completely transparent to the network. By applying this type of system, you build an optimal framework for future security applications.

security identifier   Read More

Financial Mobility-Balancing Security and Success


No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more.

security identifier   Read More

Network Associates RePositions Itself as a Security E-Village


With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside funding and a type of web-based CIO Helpdesk.

security identifier   Read More