TITLE

Start-up breaks into security market

AUTHOR(S)
Brown, Bob
PUB. DATE
December 1998
SOURCE
Network World;12/21/98, Vol. 15 Issue 51, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Profiles Needham, Massachusetts-based Shym Technology Inc., a start-up computer network security company. Company background; Company's plan to introduce computer network security middleware products.
ACCESSION #
2542247

 

Related Articles

  • New Security Tools Combat Internal Risk. Kerstetter, Jim // PC Week;01/11/99, Vol. 16 Issue 2, p1 

    Looks at two computer security products designed to protect networks from internal threats. The CyberwallPlus suite of applications from Network-1 Security Solutions Inc.; The Shym PKEnable suite from Shym Technology Inc.; How each suite works; What they can prevent; Pricing; Why internal...

  • Is Your Network Secure? Geer, David // Alaska Business Monthly;Dec2003, Vol. 19 Issue 12, p38 

    Reveals the steps businesses can do to protect their computer networks. Risks companies face; Security practices that leave openings; Sensitive information particular to Alaska; Securing instant messaging; Hardware and software firewalls; Intrusion detection.

  • Seven secrets to network security. Rosenweiz, Stan // Fairfield County Business Journal;10/7/2002, Vol. 41 Issue 40, p17 

    Provides tips and information on how to protect network security of a company in the U.S. Establishment of a suit of armor against smart and dishonest employees; Conduction of a thorough review to audit security breaches and structural weaknesses; Development of an up to date network disaster...

  • Top Web service worry: Security. Fontana, John // Network World;1/21/2002, Vol. 19 Issue 3, p1 

    Focuses on the impact of the absence of security and reliability on Web services technology in San Francisco, California. Standard of information technology for enterprise-class transactions; Discussion on the security of Web services on the Next Generation Web Services Conference; Factors...

  • Red Flags.  // Communications News;Mar2003, Vol. 40 Issue 3, p30 

    Focuses on the solutions implemented by business enterprises in improving Internet security. Security for the internal network of Via Christi Regional Medical Center in Wichita, Kansas; Virtual private network deployed by the information technology services at Johnson County, Kansas; Solution...

  • Risky business. Lepofsky, Ron // CMA Management;Nov99, Vol. 73 Issue 9, p48 

    Examines the management of costs and vulnerability of corporate computer networks. Transformation of `break and fix' technical decisions into financial decisions; Sources of vulnerability; Classes of network security products.

  • Effective security starts with policies. Andress, Mandy // InfoWorld;11/19/2001, Vol. 23 Issue 47, p56 

    Presents tips for the effectiveness of computer network security policies among companies in the United States. Steps in creating security policies; Need to communicate the policies to the employees; Ways to enforce security policies. INSET: POLICY PERFECT.

  • Security that must compute. Cytron, Scott H. // Outlook;Summer97, Vol. 65 Issue 2, p11 

    Focuses on the role of certified public accountants (CPAs) in the promotion of computer system security in businesses. Measurement and evaluation of risks through the Computer Risk Management (CRM) approach; Categories of security and systems risk; Small firms' development of their own versions...

  • Better the devil you know. Vowler, Julia // Computer Weekly;6/6/2002, p40 

    Reports the benefits of hiring ethical hackers to check information technology security of business enterprises. Reasons for employing ethical hackers; Disadvantages of programs aimed at regulating ethical hackers; Tips on using ethical hackers.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics