X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 writing a security rfp


The Importance of the White Paper and What It Can Do for You
The white paper—a wonderful little piece of literature chock full of thought provoking insight and informative prose—got its start many years ago, long before

writing a security rfp  more than eight months writing for TEC’s website, I’ve come to understand the importance of the white paper and what it really means in the world of technology. I’ve pored over more than a hundred of them since my journey here at TEC started, and I’ve read about everything from virtual technology to SAN storage , from LANs and WANs , to the latest in data security protection and more. The wealth of knowledge that white papers contain make them a gold mine for prospective software buyers and

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module  

Start Now

Documents related to » writing a security rfp

Success Keys for Proposal Automation


Proposal writing has become a common requirement throughout the entire business world. And for many sales people, they are a necessary evil. If you're thinking about automating your proposal process, there are ten critical success keys to a successful implementation.

writing a security rfp   Read More

“It’s a Notebook!” “It’s a Paperweight!” “Wait - It’s Both!”


Some Toshiba notebook buyers got a nasty surprise when they found their Intel CPU had died. Will Toshiba switch from “Intel Inside” to “AMD Instead”?

writing a security rfp   Read More

How to Survive a Software Selection Project When Your Boss Is a Sociopath


Is your boss the main reason you call in sick on Monday mornings? Do you need to “manage” your boss in order to get any work done? Do you find yourself in the position of having to defend your boss when talking to colleagues? Hello, your boss might be a sociopath. This may or may not be news to you. Time for a quick quiz. I am going to refer to your boss as “he,” but sociopathic

writing a security rfp   Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

writing a security rfp   Read More

A How-to Guide for a Radio Frequency Identification Site Survey


As organizations prepare for a radio frequency identification (RFID) implementation, they often don't understand the preliminary work necessary to begin the project. The importance of a site survey can influence the success or failure of an RFID project.

writing a security rfp   Read More

Benchmarking Your Quality Maturity: Turning a Cost Center into a Profit Center


To help organizations understand their current state and plan for managing quality, LNS Research covers a quality management research study of more than 1,000 manufacturing organizations to identify best practices in organizational change, business process redesign, and technology evaluation.

writing a security rfp   Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

writing a security rfp   Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

writing a security rfp   Read More

A Tale of a Few Good SCM Players - Part 3


Part 1 of this blog post series followed the progress of Manhattan Associates from its inception in 1990 throughout the mid-2000s. During this time, Manhattan was the epitome of a well-managed supply chain management (SCM) software company in terms of market share, growth, profitability, and its products’ capabilities. Indeed, the company set the industry standard for the

writing a security rfp   Read More

What Makes a Good IT White Paper Good… and a Bad IT White Paper Very, Very Bad…


A white paper is a document or “brief” (and yes, perhaps unfortunately, I mean “brief” in the sense of something that informs rather than something that is short—white papers are sometimes as concise as newspaper editorials, or run as long as the latest “… For Dummies” book; examples of this will be provided in upcoming posts). A white paper’s purpose is to educate the reader, who is the potential

writing a security rfp   Read More