X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 server security


Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

server security  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » server security

Driving the Need for Highly Effective Mail Server Security


Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because Internet security risks are increasingly malicious: Web threats are growing more than 100 percent every six months, and targeted attacks are up 351 percent from two years ago. Re-examine your approach to mail server security and protect yourself from malware attacks.

server security  for Highly Effective Mail Server Security Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because Internet security risks are increasingly malicious: Web threats are growing more than 100 percent every six months, and targeted attacks are up 351 percent from two years ago. Re-examine your approach to mail server security and protect yourself from malware attacks. Read More

Server-gated Cryptography: Providing Better Security for More Users


Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you should know how SGC-enabled SSL certificates work and why they are different from other certificates. Find out how SGC-enabled SSL can help you assure your customers that you have stronger encryption, greater privacy, and reduced risks of fraud and identity theft.

server security  gated Cryptography: Providing Better Security for More Users Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you should know how SGC-enabled SSL certificates work and why they are different from other certificates. Find out how SGC-enabled SSL can help you assure your customers that you have stronger encryption, greater privacy, and reduced risks of fraud and identity theft. Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

server security  an attack) The intranet server risk = 96, a lower security risk assessment ranking. Even though the intranet server has greater vulnerability, the value of the asset creates a lower relative risk value than that of the e-commerce server. Performing an overall security risk assessment this way allows organizations to make wise decisions when it comes time to deploy scarce resources to optimize the protection of their assets. Security risk management is a process of managing an organization's exposure to Read More

Fixing Security Backdoors: Red Hat 1, Microsoft 0


April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

server security  to flood an NT server and expose a security hole. (The file originally contained the Netscape commentary .) Microsoft originally denied the existence of a security hole, but later suggested that users delete the file. Market Impact There's a clear difference between Microsoft and Red Hat in their responses. Red Hat posted a fix within six hours of the MSNBC story. Microsoft has yet to issue a patch for its problem. To be fair, the Red Hat breach is potentially more serious. Red Hat 6.2 servers running Read More

6 Important Steps to Evaluating a Web Security Solution


Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control.

server security  Important Steps to Evaluating a Web Security Solution Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorizatio Read More

Security Snafu at NetBank


Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information than his own.

server security  Snafu at NetBank Event Summary NetBank (Nasdaq: NTBK ), an Atlanta based internet bank, suffered a major credibility blow last week when a customer named Mahesh Rao reported that he had been inadvertently given access to another customer's account, transaction history, social security number, and funds. Rao had to call NetBank five times before the problem was resolved. According to Tom Cable, Chief Technology Officer of NetBank, the problem occurred due to human error. NetBank is an FDIC insured Read More

IT Security- What You Don't Know Can Cost You Big


In the white paper 7 essential steps to security risk reduction, you'll learn about a program that quantifies your security system's ability to han...

server security  Security- What You Don't Know Can Cost You Big You have a network and data security system in place. But can you measure its level of effectiveness? Or its preparedness to respond to new threats? If you can't, you're flying blind, and it could cost you. Without the ability to monitor and measure the state of your security system, you're giving up the ability to truly manage it—and that could mean the difference between failure and success. In the white paper 7 Essential Steps to Security Risk Read More

Ernst & Young Leads Big 5 in Security


Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

server security  & Young Leads Big 5 in Security Ernst & Young Leads Big 5 in Security L. Taylor - May 19, 2000 Event Summary Announcing an upgrade to its online security portal, Ernst & Young is clearly out in front of the big five when it comes to security consulting services. Its newly expanded online portal, eSecurityOnline.Com, offers a multitude of resources including newsgroups, mailing lists, vulnerability and virus information, a listing of security service offerings, security training, a library, and much Read More

IBM Server Line Redrawn


IBM has continued its renaming binge, moving from PCs to servers.

server security  Server Line Redrawn IBM Server Line Redrawn R. Krause - October 20, 2000 Event Summary [Source: IBM press release] Oct. 3, 2000 - IBM announced its new server product line, the IBM eServer. IBM's existing server and mainframe product lines (previously known as S/390, RS/6000, AS/400, and Netfinity) will now carry the eServer name and logo, starting with the first shipments, expected sometime this quarter. In addition to the renaming, IBM has announced new features, including: Capacity upgrade on demand Read More

Rackmount Server Sales Surge


Rack-optimized servers are reported to have increased their quarter-over-quarter unit sales by over 50%

server security  Server Sales Surge Rackmount Server Sales Surge R. Krause - August 17, 2000 Event Summary July 31, 2000 - IDC reports that unit sales of rack-optimized Intel-based servers increased over 55% from 4Q99 to 1Q00, compared with a 2% decline for the overall Intel server market. In the meantime, major Intel server vendors are planning to increase their rack-optimized products offerings in the coming months. Market Impact This trend has been obvious for a long time, so we're surprised it took the market Read More

Managing SSL Security


Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As organizations increasingly rely on SSL, the number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity.

server security  SSL Security Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As organizations increasingly rely on SSL, the number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity. Read More

Microsoft Announces SQL Server 2000


On December 13, Microsoft Corp. announced that the next major release of Microsoft« SQL Server, currently code-named "Shiloh," would officially be named SQL Server 2000. Microsoft also revealed the features within SQL Server 2000 that will take advantage of the Microsoft Windows« 2000 operating system. SQL Server 2000 is due to ship in the first half of 2000 and is currently in beta testing at nearly 750 companies.

server security  Announces SQL Server 2000 Event Summary REDMOND, Wash. - Dec. 13, 1999 - Microsoft Corp. today announced that the next major release of Microsoft SQL Server, currently code-named Shiloh, would officially be named SQL Server 2000. Microsoft also revealed the features within SQL Server 2000 that will take advantage of the Microsoft Windows 2000 operating system, as well as the ways SQL Server 7.0 customers today can reap benefits from Windows 2000. SQL Server 2000 is due to ship in the first half Read More

New Market for Security Insurance


Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer corporations that they don't get in their standard General Liability Insurance Policy coverage?

server security  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More