Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.
: firewall, firewall software, firewalls, fire wall, firewall router, server firewall, firewall pro, firewall security, firewall vpn, internet firewall, best firewall, firewall test, network vpn, hardware firewall, firewall network, proxy firewall, firewall 1, sonic wall, checkpoint firewall, microsoft firewall, juniper firewall, computer firewall, firewall appliance, firewall check, sonicwall firewall, firewall spam, fire walls, sonicwall 170, nat firewall, snapgear, firewall linksys, firewall networking, firewall update, vpn appliance, switch firewall, netscreen firewall, spi firewall, .
A Firewall is Cheaper Than a Lawyer
eBay's motion for a preliminary injunction to limit Bidder's Edge online auction search engine from linking to their site, may set precedents for future interstate web links. On the other hand, proper implementation of a firewall makes the whole case a moot point.
: Firewall, limit Bidder's Edge, online auction search engine, ebay lawsuit, auction aggregators, eBay Inc. v. Bidder's Edge, D. Calif. No 0-99, 21-200, link to ebay, firewall technology, ebay security, firewall market, ebay firewall.
InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention.
: firewall reporting software, log analysis tools, firewall log analyzer, isa log analyzer, firewall appliance, syslog analyzer, checkpoint log analyzer, firewall analyzer, hardware firewalls, managed firewall service, firewall server software, managed firewall services, log viewer, firewall log analyser, apache log reader, sonicwall log analyzer, server firewall, hardware firewall, checkpoint log analysis, system log management, checkpoint firewall logs, log analysis, firewall log viewer, firewall tools.
Check Point Leads Firewall Market
With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.
: firewall proxy, checkpoint appliance, checkpoint software subscription, pointsec protector, firewall appliance, virtual firewall, checkpoint log analyzer, managed firewall service, hardware firewalls, sonicwall nsa 240, firewall managed services, firewall analyzer, network firewalls, pointsec encryption, server firewall, firewall appliances, server firewall software, alarm zone pro, network security devices, utm 1 270, utm 1 570, checkpoint utm 1 570, pointsec pc, checkpoint appliances, portable firewall, firewall products.
Analysis of Virgin Net s Hacker Scare
The Company only operates in England and claims the break-in attempts were only to specific and contained areas.
: hacker, ethical hacking learn, hacking server, hacker evolution untold, hacking, hacking tutorial, how to hack, virgin, e-mail, e-mail security, hotmail.
WAP Forum Specifies RSA’s RC5 Encryption For Wireless
As the wireless community continues to grow at mind-boggling rates, security has become a key concern, not only in the eyes of users, but also to vendors and service carriers.
: rc5, rsa, wtls, network security, rc5 encryption , rsa security , WAP Forum, rsa encryption, Encryption For Wireless, Wireless Transport Level Security, e-business security, electronic security, data encryption algorithm , encryption technology , network security software, rsa key, rsa algorithm, business network security, rsa appliance, Rivest, Shamir and Adleman.
Los Alamos Loses Top-Secret Information, Again!
Another security compromise occurred at Los Alamos National Laboratories last month when two hard drives containing top-secret nuclear information disappeared. The security mistakes that are being made at Los Alamos are sloppy and unacceptable.
: solar energy, los alamos, geothermal energy, sources of energy, los alamos nm, los alamos national, renewable energy solar, los alamos laboratory, los alamos new mexico, hotel los alamos, los alamos national laboratory, hotels los alamos, los alamos homes, alternative energy resources, los alamos national bank, los alamos nm homes for sale, los alamos lab, los alamos jobs, posada los alamos, los alamos national lab, inn los alamos, los alamos weather, los alamos map, los alamos rental, los alamos project, los alamos labs, los alamos museum.
Alibris Charged with Intercepting Email
Internet book dealer Alibris has agreed to pay a $250,000 fine after being charged with 10 counts of intercepting electronic communications.
: alibris, email security threats, network security, email security policy, email interception, emails security, email privacy, employee monitoring, employee monitor, employee surveillance, monitor employees, employee monitoring software, rare books, email security, email security privacy, email monitoring, email confidentiality, email employer, monitor employee internet use, monitor employee internet usage, email security product, corporate email security, email security solution, email security products, email security solutions, business email security, email security programs, email .
Trend Micro Anti-Virus Server for Microsoft Exchange ~ A Secure Choice For Enterprise Wide Anti Virus Protection.
Some of the more widely known viruses, such as the
: exchange anti virus, anti virus, tren micro, trend micr, trent micro, trend pc, tred micro, trand micro, trend micros, trend mico, trends micro, trend mirco, trend microsystems, trend virus protection, internet security software, antivirus for exchange, trend anti virus, virus protection software, anti virus protection, virus detection, exchange antivirus, anti virus software, trend antivirus, top ten antivirus, free virus scan, virus software, antivirus software, virus program, trend anti spyware, virus check, top 10 antivirus, free adware, free trial antivirus, free online virus scan, .
CIOs Need to Be Held Accountable for Security
As systems, networks, and websites suffer new magnitudes of Denial of Service attacks, malicious network scans, and network intrusions, organizational CIOs need to be held accountable for information security.
: pci scanning, security monitoring, network penetration testing, web filtering, penetration testing, web vulnerability scanner, outsource it, web application firewall, network penetration test, pci dss, application security testing, internet security services, it security standards, penetration test, it news, testing vulnerability, web application security scanner, network security solutions, audit it security, gateway security, web application security testing, scanner vulnerability, web testing, information security issues, managed security services, networking security, web application .
The CyberAngel: Laptop Recovery and File Encryption All-in-One
Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.
White Paper Newsletters