"The new HP has what it takes for market leadership in South Africa and in the rest of the world."
[ June 2002, News + Events ]
"AST is able to provide either standalone or fully integrated solutions utilising enterprise systems, Internet and intranet sources to enable intelligent management of facilities, through the application of Honeywell's Enterprise Building Integrator."
[ June 2002, Security
"It is accurate to say that by and large, South African companies are still at a loss when it comes to trying to plug the holes in their enterprise IT systems and trying to ensure that those holes remain plugged."
[ June 2002, Security
"Users operating in a client server environment can now leave their PC logged on and with applications running safe in the knowledge no one can access their data or the network."
[ June 2002, Security
The Sun ONE Platform for Network Identity includes two offerings - enterprise and Internet editions
[ June 2002, Security
"E-Commerce is going to explode and that will open up the world, not only for the bankable but also for the unbanked, the majority of the citizens in this country."
[ July 2002, Security
At this point in time organisations are still deciding to accept risk on the basis that the impact of a serious security breach is likely to cost less than the implementation of strong authentication methods.
[ July 2002, Security
For an organisation to achieve the payoffs of e-business, it must make sure the e-business environment is trusted and secure - which requires, among other things, a sound authorisation infrastructure to efficiently manage access privileges for a large and diverse group of users
[ July 2002, Security
In acquiring an access control system that will meet the needs of either a small organisation, or a large enterprise, there are obvious issues where businesses need to be asking crucial questions
[ July 2002, Security
Good security management impacts three critical aspects of any business: people, process and technology
[ July 2002, Security
We cannot even start to guess the amount of fraud in areas like finance, medicine and government – and the bottom line is that most of it is preventable with modern access control technologies.
[ July 2002, Security
Despite today’s heightened emphasis on security, information security breaches continue unabated and the ‘it will not happen to me’ attitude is both a naïve approach and a pricey, if not fatal, gamble
[ July 2002, News + Events
e-business security should focus on three key aspects: strategic management; defence; and access
[ July 2002, Security
The term 'appliance' is loosely applied to a whole range of products, which can lead to confusion
[ July 2002, Security
Aiming to prevent disasters is at least as important as knowing what you will do afterwards
[ July 2002, Security
Business continuity is a specialist field and most companies do not have the expertise in-house to draw up and manage a proper continuity strategy
[ July 2002, Security
![]() | ![]() | Copyright c1995-2009 Technews Publishing (Pty) Ltd.. All rights reserved. |