Home
 > search for

Featured Documents related to »  security news rss feed


Application Giants in Duel and Duet for Users’ Hearts, Minds … and Wallets
While SAP and Microsoft are concurrently partnering for certain initiatives, they are still dueling about who is bigger, better, smarter, whose user screens are

security news rss feed  data. As for the security issues, the challenge Duet faces with authentication is that authentication needs to be separated from the authentication within the system. For authentication within the system, Duet reuses the authentication of the local user in the Microsoft Windows environment. This is generally implemented using Windows NT LAN (Local Area Network) Manager or Microsoft Active Directory, which most users are familiar with. Within Duet, SAP security experts have developed a module that is able Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security news rss feed


eCLIPse, Encryption Security Solution
eCLIPse Enterprise Security Solution is an encryption software security solution for any business that requires frequent exchange of secure encrypted data

security news rss feed  Encryption Security Solution eCLIPse Enterprise Security Solution is an encryption software security solution for any business that requires frequent exchange of secure encrypted data. eCLIPse provides safe transfer of confidential data to and from authorized external resources and prevents unauthorized viewing. Security is managed by smart-card technology (smart-card chip fitted into a USB token). Using simple and physically secure USB tokens, eCLIPse functions at the National Institute of Read More
Case Study: Security Benefit
Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For

security news rss feed  Study: Security Benefit Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data. Read More
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's

security news rss feed  leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step process allows organizations to proactively manage risk by baselining what Read More
Best Practices for Implementing a Security Process
Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But

security news rss feed  Practices for Implementing a Security Process Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But without a solid process backing up the technology, organizations will still be susceptible to emerging threats. Learn more about aligning security processes with the latest security technologies to create a barrier against today’s most insidious threats. Read More
Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to

security news rss feed  Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle. Read More
Malware Security Report
Learn how to protect your company in the VeriSign Malware Security Report.

security news rss feed  Security Report Silent and unseen, malware can infect your servers and Web sites, destroy customer trust—and put your business at risk. And the problem is getting worse as cyber criminals use increasingly sophisticated techniques to spread malware through the Web. Learn how to protect your company in the VeriSign Malware Security Report . You'll learn about the methods cyber criminals use, how they attempt to profit at your expense—and how you can stop them. Protect your company from the Read More
Vendor Analysis: Interliant's Security Vulnerability Assessment
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to

security news rss feed  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More
Standard & Poor's Announces Security Certification
After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

security news rss feed  & Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle Read More
Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them

security news rss feed  firewalls to assure network security within the corporate intranet, when connected to other corporate internets, and when connected to public networks. E-mail encryption at the desktop and e-mail gateways. Virus inoculation at the desktop, servers, and e-mail gateways. Remote diagnostics for personal computers. Public data networks with and without Virtual Private Network capabilities. Business Management Response Share the responsibility for assuring business continuity and data security through Read More
Security Information Market Heading for Growth
The growth of security vulnerabilities is creating a new market for security information. With link sharing and cooperation among sites, it is not clear that

security news rss feed  Market Heading for Growth Security Information Market Heading for Growth L. Taylor - August 31, 2000 Event Summary It is estimated that the security information market will grow to a $1.5 billion by 2003.[1] With a dearth of security professionals available, viewing online security articles offers companies the opportunity to gain information, and improve system security knowledge at low overhead and a fast pace. Via the web, IT organizations can find out about security bugs, patches, and exploits; read Read More
Database Activity Monitoring: Intrusion Detection and Security Auditing
At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of

security news rss feed  Monitoring: Intrusion Detection and Security Auditing At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable. Read More
Security and Trust: Doing More Business Over the internet
Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.

security news rss feed  you make sales in Security and Trust: Doing Business Over the Internet . You—ll learn about the different types of technologies that provide security for sensitive data—identifying your site as trustworthy in the eyes of customers—and how making your web site safe and secure can significantly increase your online sales. Find out how to boost sales by protecting your customers and earning their trust. Download your PDF copy of Security and Trust: Doing Business Over the Internet today . For Read More
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

security news rss feed  Management in Web Application Security Originally published January 27, 2006 Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of government regulations aimed Read More
Intrusion Detection and Security Auditing In Oracle
Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of

security news rss feed  Detection and Security Auditing In Oracle Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others