Software restricts access to sensitive files

December 1998
Network World;12/07/98, Vol. 15 Issue 49, p46
Trade Publication
Reports on Digital Delivery Inc.'s release of Confidential Courier 2.1, an updated version of the company's client/server security application. Product capabilities; Private-key encryption technology; Contact information.


Related Articles

  • ESM Upgrade Unifies Vulnerability Scanning. Phillips, Ken // PC Week;01/25/99, Vol. 16 Issue 4, p59 

    Reviews Enterprise Security Manager 5, software from Axent Technologies Inc. that provides agent-based scanning for computer network security. Reporting capabilities; Types of businesses, which will benefit most from the software; Server operating systems for which it will work; Pricing;...

  • Research on Security Awareness and Countermeasures for the Single Server. Hyuk-Jin Son; Seungdo Jeong // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p31 

    Accompanying to the growing utilization and dependency on the internet and the ICT (Information and Communication Technology), the threat by hacking, malicious code and virus are rising as serious problems. Especially, the single server which is hosted by professional hosting companies is...

  • Bottled doors don't always secure data. Coffee, Peter // PC Week;8/8/94, Vol. 11 Issue 31, p17 

    Focuses on the construction of a system that permits queries about statistical aggregates while preventing queries about specific statistics in a client/server environment. Authorized query; Preventing type of access to single salary of interest; Difficulty in constructing such systems;...

  • Protecting vulnerable client/server data. Paul, Lauren Gibbons; Bridges, Linda // PC Week;8/8/94, Vol. 11 Issue 31, p17 

    Focuses on protecting vulnerable client/server data. Security breaches affecting computer data; Benefits of centralized mainframe systems; International Business Machines Corp.'s (IBM) RACF (Remote Access Control Facility); Development of in-house client/server applications; Single-point...

  • It's time to put an end to trust-based security. Comaford, Christine // PC Week;8/8/94, Vol. 11 Issue 31, p21 

    Argues against the continued use of trust-based security for the client/server environment. Need for policy-based security, system-administrator controls and solid audit trails; Reliance on file-based security; Policies as essential business rules; Need for automatic policy enforcement linking...

  • Traders are bullish on security. Shein, Esther // PC Week;3/25/96, Vol. 13 Issue 12, p22 

    Focuses on the security of client/server applications. Traders' concerns; Security design; Barriers to protecting information assets.

  • Eight Reasons Why Your Server Security Is Insufficient. Preimesberger, Chris // eWeek;8/5/2015, p1 

    The article discusses eight reasons regarding why server security is insufficient in business enterprises. Topics discussed include production of security tools to protect server infrastructure due to market fragmentation, organization relying on patches to defend their systems operating system,...

  • Protecting Servers from Virus Attack. Rudich, Joe // Link-Up;Mar/Apr2000, Vol. 17 Issue 2, p12 

    Deals with the importance of anti-virus software in server administration. Anti-virus software designed to provide protection for servers; Information on the International Computer Security Association; Management functions of an anti-virus system.

  • Intelligent agents will monitor LAN health. Louderback, Jim // PC Week;10/31/94, Vol. 11 Issue 43, p158 

    Focuses on client/server computing. Legent Corp.'s vision of developing an intelligent agent that will continually monitor the health and well-being of every device and application on the network; Use of Microsoft Mail Remote; Legent's development of an interoperability middleware, called XPE.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics