Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Data Breach Notification Laws: The Need for Spyware Detection Capability
Security measures that repel spyware attacks are critical to any comprehensive security plan, thanks to laws requiring companies to notify their customers if they experience a data security breach. But it’s not enough to have a plan for complying with breach notification laws. Every company’s goal should be to avoid having to give such a notification in the first place.
: Data Breach Notification Laws: The Need for Spyware Detection Capability Data Breach Notification Laws: The Need for Spyware Detection Capability Source: Webroot Software Document Type: White Paper Description: Security measures that repel spyware attacks are critical to any comprehensive security plan, thanks to laws requiring companies to notify their customers if they experience a data security breach. But it’s not enough to have a plan for complying with breach notification laws. Every company’s
6/26/2006 3:21:00 PM
Abandon All Insecurity, Ye Who Enter Here
Commerce One will add Netegrity’s secure portal management solution to its offerings. This will add a wide range of access control mechanisms, personalization capabilities and single login for customers.
: Abandon All Insecurity, Ye Who Enter Here Abandon All Insecurity, Ye Who Enter Here D. Geller - May 26, 2000 Read Comments D. Geller - May 26, 2000 Event Summary Netegrity, Inc. (Nasdaq: NETE) specializes in solutions for secure management of websites. Their flagship product, SiteMinder, is a highly scalable access control system that provides single login over multiple domains and supports a variety of access control mechanisms down to the sub-page level. Commerce One (NASDAQ: CMRC) will bundle
Study Reveals Top 10 Requirements for Improving Event Resolution in IT
Study Reveals Top 10 Requirements for Improving Event Resolution in IT. IT White Papers and Other Computer Software to Use In Your Dynamic System Related To Top 10 Requirements for Improving Event Resolution in IT. A survey of existing IT event resolution processes suggests organizations are unsatisfied with current processes, despite the importance of ensuring that severe service outages do not occur. In fact, over 75 percent of participants identified significant gaps in existing processes. However, it is possible to identify the components of an effective interactive event notification platform to mitigate current process gaps.
: an effective interactive event notification platform to mitigate current process gaps. Study Reveals Top 10 Requirements for Improving Event Resolution in IT style= border-width:0px; /> comments powered by Disqus Related Topics: IT Infrastructure and Development, IT Help Desk, IT Monitoring and Management, Network Management, Network Monitoring, Outage Reporting Source: AlarmPoint Systems Learn more about AlarmPoint Systems Readers who downloaded this white paper also read these
5/26/2006 7:55:00 PM
Financial IT Reg Enforcement Service: Using FFIEC Security Best Practices to Ensure Laptops and PCs are Secure and Compliant
Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance.
: laws, data breach notification laws, data breach laws by state, state data breach laws, glba safeguards rule, state data breach notification laws, gramm leach bliley safeguards rule, data breach disclosure laws, ftc safeguards rule, patch management Source: Fiberlink Learn more about Fiberlink Readers who downloaded this white paper also read these popular documents! Best Practices for ERP Implementation Sales Process Map The Importance of Data Representation: Best Practices in
3/19/2012 3:33:00 PM
Magic Quadrant for Managed File Transfer
Magic Quadrant for Managed File Transfer. Get Free Advice Related to Managed File Transfer. Companies should consider managed file transfer (MFT) suite vendors that meet their tactical and strategic needs. It's all too easy to be reactive and deploy technology that supports only one file transfer protocol and one standard for secure file transfers. It's more prudent to deploy a product that can be easily expanded and upgraded to handle multiple protocols and multiple standards in a well-managed, auditable way.
11/4/2008 10:51:00 AM
Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach
Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this integration is to take advantage of the infrastructure provided by a Central Authentication Service (CAS) to offer single-sign-on Web authentication, while improving security beyond basic mechanisms based on login and password. Find out more.
: Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach Source: GE Document Type: White Paper Description: Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this integration is to take advantage of the infrastructure provided by a Central Authentication Service (CAS) to offer single-sign-on Web
6/26/2010 9:11:00 PM
Lawson Software-IPO and Several Acquisitions AfterPart Three: Market Impact
In several aspects, Lawson Software could be regarded as an enterprise applications market anomaly. For one, at its peak in fiscal 2002, the company boasted annual revenues of nearly $430 million, but it still has only a slender (less than 10 percent of revenues) presence outside of its US domestic market. Further, it remains a major force in enterprise applications software, yet it does not cater the functionality to manufacturing sectors, and the vastness of its sales are thus derived from just a few service-oriented vertical markets-primarily health care and retail.
: a stand-alone product, Smart Notification has meanwhile become integrated as a standard feature in all Lawson products. It enhances the capabilities of Lawson s applications to automatically deliver event-driven notifications across an organization s enterprise and instantly push key information to the right people. Lawson Smart Notification , the configurable, collaborative solution delivers information that is user defined and can be received via personal digital assistant (PDA), e-mail, voice, text
SCP and SCE Need to Collaborate for Better FulfillmentPart One: How SCP and SCE are Addressing WMS
Warehouse management and transportation management have emerged as two of a few rare remaining fertile areas where companies still have ample opportunity to redesign and optimize. At the same time, these areas are less time-consuming and more oriented towards return on investment (ROI) in terms of incrementally improved operating costs and fulfillment capabilities.
: and escalates exceptions, sends notification, and reacts appropriately to those exceptions, ideally without human intervention. As a proof of concept, the other vendors still doing well in the segment are those that enable companies to efficiently manage trading relations, demand management and fulfillment processes. Companies such as Prescient Systems , Escalate , Demand Management , RiverOne , WorldChain , SoftChain , webplan , Demantra , John Galt , PipeChain , VCommerce , Ortems , SeeCommerce , and Tr
Web Application Security: The Truth about White Box Testing versus Black Box Testing
Web Application Security: The Truth about White Box Testing versus Black Box Testing. Read White Papers and Other Software for Your Estimation Related to Web Application Security. Information security managers, quality assurance staff, and developers are faced with the enormous responsibility of keeping Web applications secure from the ever-growing menace of hackers and internal threats alike. So how can they protect sensitive data without exhausting internal resources, overspending the budget, or being forced to use costly manual penetration testing using external consulting firms?
: Web Application Security: The Truth about White Box Testing versus Black Box Testing Web Application Security: The Truth about White Box Testing versus Black Box Testing Source: Cenzic Document Type: White Paper Description: Information security managers, quality assurance staff, and developers are faced with the enormous responsibility of keeping Web applications secure from the ever-growing menace of hackers and internal threats alike. So how can they protect sensitive data without exhausting internal
8/22/2007 3:32:00 PM
Customer Relationship Management (CRM) Software Evaluation Report
: Customer Relationship Management (CRM) Software Evaluation Report allows you to compare and analyze the features, functions, and services of multiple enterprise software solutions. Vendor responses are comprehensively rated on their level of support of for each criterion (supported, not supported, customization, future releases, etc.) to ensure you make and accurate and informed decision.
International Trade or ITL Adoption
Globalization of the Supply Chain means adoption of ITL is not an option.
: International Trade or ITL Adoption International Trade or ITL Adoption Bill McBeath - December 9, 2003 Read Comments Winning Retailers Philosophy of Business Winning retailers philosophy of business is that every product not sitting in front of a customer is an inefficient use of capital. They are increasing the velocity between factory and shelf, and improving in-store service levels using mechanisms such as cross-docks, continuous replenishment, and VMI. Because the retail supply chain is so
White Paper Newsletters