Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Secure in a Foundry
Foundry Networks™, Inc. announced that they would be incorporating Secure Shell (SSH) Technology for free in all of its high-performance switching devices. That’s right! Foundry Networks has just made every Network Manager’s dream come true.
: Secure in a Foundry Secure in a Foundry G. Duhaime - June 9, 2000 Read Comments G. Duhaime - June 9, 2000 Event Summary Foundry Networks, Inc. announced that it would be incorporating Secure Shell Technology into all high-performance switching devices free of charge. According to Ken Cheng, Vice President of marketing for Foundry Networks, The internet has become the mass communication medium and an economic way to communicate among remote sites. It is used increasingly to access networking devices for
How Secure is Your E-Mail?
A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read your mail
: How Secure is Your E-Mail? How Secure is Your E-Mail? P. Hayes - October 1, 1999 Read Comments What is Secure E-Mail? Secure electronic mail is electronic communication which guarantees messages arrive intact and unhampered in the intended recipient s inbox. If a message can be intercepted, the contents can and most likely will be tampered with. The process of intercepting electronic communication on public networks, such as the Internet, has been simplified. A party interested in viewing point to point
Tempest Creates a Secure Teapot
Tempest Software has announced the release of TMS (Tempest Messenger System) version 3.1.1. The product allows suppliers and customers to query corporate databases without any direct access to the actual web or database servers. A firewall is placed between the Internet and the internal systems and the firewall is configured to allow no incoming traffic. This product should prove to be a great annoyance to hackers everywhere.
: Tempest Creates a Secure Teapot Tempest Creates a Secure Teapot M. Reed - October 30, 2000 Read Comments M. Reed - October 30, 2000 Event Summary Tempest Software, Inc. today announced it is shipping Release 3.1.1 of its flagship TMS (Tempest Messenger System) product. The enhanced capabilities in this new release are said to raise the standards of performance in Internet enterprise application exchange. The new release includes a feature referred to as TSWEG , or Tempest Secure Web Gateway, which
Secure Your Source Code
Are you on top of data security compliance? Is your source code secure? Are you looking for a new approach that can help ensure these things are taken care of? With SourceAnyware Hosted solution—which provides 128-bit SSL encryption—your data is protected and your source code is secured from attacks. Find out how SourceAnywhere can help you lower total cost of ownership and improve your development team productivity.
: Secure Your Source Code Secure Your Source Code Source: Dynamsoft Corporation Document Type: White Paper Description: Are you on top of data security compliance? Is your source code secure? Are you looking for a new approach that can help ensure these things are taken care of? With SourceAnyware Hosted solution—which provides 128-bit SSL encryption—your data is protected and your source code is secured from attacks. Find out how SourceAnywhere can help you lower total cost of ownership and improve
11/26/2007 3:07:00 AM
Jabber XCP: The Secure Choice for Presence and Messaging
At Jabber, Inc., security is a core priority in every phase of design, implementation, and deployment. We aggressively apply lessons learned from other Internet-scale technologies and from our work with customers in the financial, government, and telecommunications sectors to achieve continuous improvement in the security profile of our products. In this whitepaper, we delve into the core security features of Jabber XCP.
: Jabber XCP: The Secure Choice for Presence and Messaging Jabber XCP: The Secure Choice for Presence and Messaging Source: Jabber, Inc. Document Type: White Paper Description: At Jabber, Inc., security is a core priority in every phase of design, implementation, and deployment. We aggressively apply lessons learned from other Internet-scale technologies and from our work with customers in the financial, government, and telecommunications sectors to achieve continuous improvement in the security profile of
7/31/2008 1:24:00 PM
The Adaptive Business Network in High-tech Industries
High tech is the most brutally competitive of any manufacturing sector—which is why complacency can mean death for your company. How to secure lasting advantage without letting technology constrain your business processes? And how to prevail despite your partners’ legacy applications, the IT landscape of your recently acquired company, or the heterogeneous mix of your own IT landscape?
: your company. How to secure lasting advantage without letting technology constrain your business processes? And how to prevail despite your partners’ legacy applications, the IT landscape of your recently acquired company, or the heterogeneous mix of your own IT landscape? The Adaptive Business Network in High-tech Industries style= border-width:0px; /> comments powered by Disqus Related Topics: Product Development and Portfolio Management (PPM), Supply Chain Management (SCM), Sales and
3/7/2007 4:18:00 PM
Security and Trust: Doing More Business Over the internet
Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.
: carts. Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet . You—ll learn about the different types of technologies that provide security for sensitive data—identifying your site as trustworthy in the eyes of customers—and how making your web site safe and secure can significantly increase your online sales. Find out how to boost sales by protecting your customers and earning their trust. Download your PDF copy of Security and Trust: Doing Busi
9/14/2010 2:00:00 PM
Secure Transport of EDI and XML for Trading Exchanges
IPNet Solutions adds support for the AS2 security standard to its product suite. IPNet builds products to link marketplace partners who use different data formats.
: Secure Transport of EDI and XML for Trading Exchanges Secure Transport of EDI and XML for Trading Exchanges D. Geller - August 3, 2000 Read Comments D. Geller - August 3, 2000 Event Summary IPNet Solutions, Inc. specializes in solving the dirty little secret of e-commerce: having different data formats at different partner sites is a significant barrier to business success. IPNet s software provides a hub through which messages to and from partners and the exchange pass; inside the hub IPNet s products do
Case Study: Achieving a 99.7% Guaranteed IT Asset Tracking Rate
Guaranteed Life Cycle Management - How Grant Thornton Achieves 99.7% accuracy tracking its IT Assets using Secure Asset Tracking. Download IT Analysis Reports on Guaranteed Life Cycle Management and Secure Asset Tracking. Learn how Grant Thornton achieved a 99.7% guaranteed IT asset tracking rate across a nation-wide network of leased computers to tightly control network endpoints, achieve regulatory compliance, and drive down total cost of ownership (TCO).
: its IT Assets using Secure Asset Tracking If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking&8482; solutions. Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery. Source : Absolute Software Resources
4/9/2008 5:14:00 PM
Secure Transfers of Large Files Over the Internet Using YouSendIt
A growing problem with rich multimedia electronic presentations is their increasing file size. Data files, in general, are larger, making it challenging to send them over the Internet. Most e-mail clients have limitations on attachment sizes, thus securely sending a one hundred megabyte PowerPoint presentation with embedded video over e-mail is nearly impossible. YouSendIt, however, offers solutions consisting of a free web service and the YouSendIt Enterprise Server. Both solutions offer comprehensive security options. The YouSendIt Enterprise Server is an enterprise level, complete large file transfer consisting of a dedicated server that can integrate with existing network security infrastructure.
: Secure Transfers of Large Files Over the Internet Using YouSendIt Secure Transfers of Large Files Over the Internet Using YouSendIt Ahsan Haque - October 23, 2004 Read Comments Introduction Does the following situation sound familiar to you? You have to send a large PowerPoint presentation document to an overseas customer, and the customer s e-mail system will not accept large file attachments. Your customers need the file as soon as possible. You try different options, different e-mail clients, sending a
Packard Bell / NEC Leads Secure Etoken Deployment
On October 19, Aladdin Knowledge Systems ( Nasdaq: ALDN ), a global leader in the field of Internet content and software security, announced with Packard Bell NEC International ( Nasdaq: NIPNY ), the leading brand of consumer PCs in Europe, an agreement to bundle approximately 50,000 eTokens on Packard Bell PCs. The eTokens, or Internet keys, will come in different colors so that all family members can have a unique color code. Retail shops in Belgium expect to have eTokenized PCs on their shelves by November.
: Bell / NEC Leads Secure Etoken Deployment Packard Bell / NEC Leads Secure Etoken Deployment L. Taylor - October 22, 1999 Read Comments Event Summary On October 19, Aladdin Knowledge Systems ( Nasdaq: ALDN ), a global leader in the field of Internet content and software security, announced with Packard Bell NEC International ( Nasdaq: NIPNY ), the leading brand of consumer PCs in Europe, an agreement to bundle approximately 50,000 eTokens on Packard Bell PCs. The eTokens, or Internet keys, will come in dif
White Paper Newsletters