X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 technology security program


How RFID Technology Can Enhance Your Asset Management Program
Even though the technology has been around in some form since World War II, chances are that you think of Wal-Mart’s supply chain initiative when you hear the

technology security program  asset management through RFID technology today. The US Army is developing a prototype RFID-based system that will measure not only how many times a weapon is ired ' something that must be manually recorded today, even in combat ' but also the effects of those irings (heat, force, vibration) on the gun barrel. This information will assist the Army in understanding the maintenance requirements of a weapon's barrel. In another example, nearly half of the healthcare organization respondents to a 2005 survey

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » technology security program

Arming Your Security Operations with the Right Technology and Services


This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of security or intrusion into data can be damaging for companies, leading to financial losses and diminished reputation. Most companies today require the implementation of a holistic security program, and a partner who is aware of the most relevant technology and service for their kind of business.

technology security program   Read More

Making Gramm-Leach-Bliley Security Compliance Fast and Easy


Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial information. For the approximately 9,500 financial institutions affected, compliance can be complex and process-intensive. Learn about network security auditing and vulnerability management solutions that can make GLBA compliance faster and more cost-effective.

technology security program   Read More

Cigna Finds Good Therapy: Building a More Efficient Risk Management, Compliance, and System Security Program


As a provider of employee benefits, CIGNA must observe a bevy of regulatory compliance mandates. Because much of its efforts are compliance-focused, it continually embraces technology, searching for new products to better manage its benefit offerings and track its security risks. With QualysGuard’s vulnerability management solution, CIGNA has mitigated vulnerabilities and remained up-to-date with compliance regulations.

technology security program   Read More

Why .NET Technology Is Important for ERP


.NET technology is a wake-up call, and some people are sleeping through it! Remaining competitive means mission-critical software systems, such as enterprise resource planning (ERP) applications, must be designed from the ground up for connectivity and integration. But software developers don’t advertise their shortcomings, and some ERP vendors—and by association, their customers—are being left behind.

technology security program   Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

technology security program   Read More

Changing the Face of Technology in Education: Funding Education-Not Technology


With tight budgets and spending restrictions affecting education, there has been increased interest in using a tool that has achieved significant success in the business world—customer relationship management (CRM) for schools. This approach involves taking a "customer-concentric" view to develop strategic plans. The key, however, is to take advantage of these capabilities without creating additional "information technology" overhead.

technology security program   Read More

People’s Role in Cyber Security: Academics’ Perspective


With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities. To examine the extent to which human factors can contribute to either preserving security standards or bringing risk to company data, the whitepaper outlines the most common employee-caused security issues in the corporate ecosystem.

technology security program   Read More

Terra Technology


Terra Technology's real time forecasting (RTF) solutions use pattern recognition mathematics to monitor daily demand signals. RTF is compatible with demand planning solutions from major enterprise resource planning (ERP) and supply chain vendors, including Manugistics, SAP, and i2 Technologies. The company's real time inventory (RTI) offering is a multi-echelon inventory optimization solution which includes the following capabilities: daily inventory target updates; full integration with conventional planning systems; inventory calculation using actual demand (not average demand); measurement of actual error over actual lead time; calculation of in-season and out-of-season lead-time difference for high volume stock-keeping units (SKUs); automatic adjustment for shutdowns; and rich modeling of time-phased equipment constraints across multiple SKUs.

technology security program   Read More

Enterprise Plans for Mobile Security


Mobile devices can be essential for information-sharing and networking within enterprises. With them comes the question of security and access management. The approach a company takes to selecting mobile security must look at some key factors, including capabilities for application management and whether the device is employee-owned or company-owned. This report was put together following a survey of IT buying decision-makers at 108 medium and large enterprises. It looks at strategies for setting up effective mobile device security.

technology security program   Read More

Brio Technology Enters the ETL Market


Brio Technology (Nasdaq: BRYO) today announced Brio.Impact 4.0, an upgraded version of the industry's first analytic application designed specifically for revenue optimization. Available immediately, Brio.Impact 4.0 includes an integrated extraction, transformation and loading (ETL) capability.

technology security program   Read More