X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 software for security


The
During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier

software for security  modules in its own software. Instead, external products can be integrated. Market Impact TEC feels that this approach to security is inadequate. Our customer was not informed that this was an issue (note SAP said they had never heard the question before). Even though SAP explicitly recommends that R/3 users put the database and application servers on a separate, internal subnet, our fear is that a customer will fail to install a third party security product, and make it possible for a disgruntled

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security Selection Software Evaluation Report

Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. 

Evaluate Now

Documents related to » software for security

Choosing a Solution for Web Filtering: Software, Appliance, Managed Service?


There are three types of web security solutions: software-based, appliance-based, and managed services. Each needs to be evaluated against several key buying criteria, including the accuracy of threat protection, ease of installation and use, and total cost of ownership (TCO). Learn about the benefits of each category, and how they deal with all manner of web-borne security threats, including inappropriate use of the Web.

software for security   Read More

Enabling Security in the Software Development Life Cycle


When companies discover new security vulnerabilities, they must retrofit the affected software with an appropriate patch and fend off the wrath of customers. Each newly discovered vulnerability results in a frantic patch, halfway deployed, and potentially opens up another hole. That’s why you should address security vulnerabilities during the software development process—before you get locked into a game of catch-up.

software for security   Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware


Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.

software for security   Read More

Need for Content Security


The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best way to appear busy. Employees can open multiple pages, a few of them related to legitimate work, while the others cater to their "personal" interests. It takes a single mouse click or Alt+Tab to navigate between pages, when a supervisor appears. This white paper provides details of how Internet access can be abused and how organisation can keep a tab on its employees.

software for security   Read More

IFS Applications (v. 7.5) for ERP for Engineer-to-Order (ETO) Manufacturing Certification Report


IFS Applications (v. 7.5) is TEC Certified for online evaluation of enterprise resource planning (ERP) for engineer-to-order (ETO) manufacturing solutions in the ERP Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

software for security   Read More

The 7 Habits of Highly Effective Security


You know your organization needs to be proactive about security, but you don't know what that means. You’re a busy executive and you need your security agenda summed up in a nutshell, but you know nothing about information security. What "to do" list should you give your CIO?

software for security   Read More

IFS Applications (version 8.0) for ERP for the Oil and Gas Industry (Upstream) Certification Report


IFS Applications (v. 8.0) is TEC Certified for online evaluation of enterprise resource planning (ERP) solutions for oil and gas industry (upstream) in the ERP Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

software for security   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

software for security   Read More

Dynacom ERP (v. 11.3) for ERP for SMB Certification Report


Dynacom Enterprise is now TEC Certified for online evaluation of enterprise resource planning (ERP) for small to medium business (SMB) solutions in the ERP Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

software for security   Read More

PTC Windchill 10 for Core PLM for Discrete Industries Certification Report


PTC Windchill 10 is TEC Certified for online evaluation of core product lifecycle management (PLM) for discrete industries solutions in the Core PLM for Discrete Industries Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

software for security   Read More

Zavanti ERP Is TEC Certified for ERP for Services and PPM for PSA Evaluation


TEC is pleased to announce that Zavanti ERP by Zavanti is now TEC certified in the enterprise resource planning (ERP) for services and project portfolio management and professional services automation (PPM for PSA) software spaces. Zavanti offers an end-to-end suite of solutions for the property development, building and construction, property management, and professional services organizations, particularly the engineering, architecture, contractors, and consultants vertical markets.

software for security   Read More

Transition for Manhattan Associates Necessary for Long Term Growth


Based in Atlanta, Georgia, $78 million Manhattan Associates, Inc. develops, markets, and supports supply chain execution systems for distribution center management and Internet fulfillment. 1999 was a difficult year for the vendor, marked by reorganization and management turnover in the midst of rapid corporate expansion. Completing its transition to an Internet enabler will be important for Manhattan's long term future.

software for security   Read More

GLOVIA G2 for ERP for Discrete Manufacturing Certification Report (2014)


GLOVIA G2 by Glovia International is now TEC Certified for online evaluation of enterprise resource planning (ERP) solutions for discrete manufacturing in the Enterprise Resource Planning Evaluation Center. Built on a lean philosophy of business, it's a convincingly strong and viable ERP solution that provides significant value to its customers. Download the report for product analysis and in-depth analyst commentary.

software for security   Read More

The Service Equation: 4 Keys for IT to Create Value for the Business


IT organizations struggle with the challenges of shrinking budgets, ever-changing technology, compliance pressures, and more. For greater efficiency, many IT organizations are turning to information technology service management (ITSM) to help improve processes. But there’s still too much focus on technology and not enough on business outcomes. Learn key strategies for changing your approach to delivering IT services.

software for security   Read More