Cisco move to secure e-businesses with Safe

Duffy, Jim
October 2000
Network World;10/02/2000, Vol. 17 Issue 40, p21
Trade Publication
Features blueprint computer software Safe by Cisco in Atlanta, Georgia. Benefits of Safe on securing enterprise networks engaging in electronic commerce; Collaboration between Cisco and several vendor partners in the development of the product; Accounts on several components of Safe.


Related Articles

  • PINGS & PACKETS. Taschek, John; Dyck, Timothy // eWeek;5/27/2002, Vol. 19 Issue 21, p52 

    Reports developments related to electronic commerce in the U.S. Introduction of the computer software NetStumbler by Marius Milner; Features the security device FVS318 ProSafe VPN Firewall from Neatgear; Capabilities of the system for tunnels.

  • Measuring and ranking attacks based on vulnerability analysis. Wang, Ju; Guo, Minzhe; Wang, Hao; Zhou, Linfeng // Information Systems & e-Business Management;Dec2012, Vol. 10 Issue 4, p455 

    As the number of software vulnerabilities increases, the research on software vulnerabilities becomes a focusing point in information security. A vulnerability could be exploited to attack the information asset with the weakness related to the vulnerability. However, multiple attacks may target...

  • authentication.  // Bloomsbury Business Library - Business & Management Dictionary;2007, p554 

    A definition of the term "authentication" is presented. It refers to a software security verification procedure to acknowledge or validate the source, uniqueness, and integrity of an e-commerce message to make sure data is not being tampered with.

  • Security Features and Technologies for E-business Architecture Design. Hao Chen; Corriveau, Jean-Pierre // International MultiConference of Engineers & Computer Scientists;2007, p1150 

    E-business has been growing very quickly during recent years because of the evolution of the Web. Consequently, expectations with respect to the security of e-business systems have considerably increased. But many software designers do not possess the required expertise to choose between...

  • Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection. Mandry, Torsten; Pernul, Günther; Röhm, Alexander W. // International Journal of Electronic Commerce;Winter2000/2001, Vol. 5 Issue 2, p47 

    This article characterizes the tasks that mobile software agents can perform in electronic markets, the risks they entail, and the appropriate protective mechanisms. Market servers have to be protected against malicious agents, and mobile agents have to be protected against malicious hosts. The...

  • Procedimiento de mejora de la calidad para el desarrollo de aplicaciones de eNegocio. Ruiz de la Peña, Jenny // Revista Cubana de Ciencias Informáticas;abr-jun2013, Vol. 7 Issue 2, p22 

    With the growth of technologies of the electronic business (eBusiness) every day more companies use the eBusiness model but not always they use all their potentialities. These applications use modern technologies to develop revolutionary applications that are not limited by time, space,...

  • Eliciting security requirements with misuse cases. Sindre, Guttorm; Opdahl, Andreas // Requirements Engineering;Feb2005, Vol. 10 Issue 1, p34 

    Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically...

  • Microsoft Takes On the Ad Industry. Fox, Steve // PCWorld;Aug2012, Vol. 30 Issue 8, p7 

    The article discusses how software company Microsoft's "Internet Explorer 10" does not track user behavior by default and the implications this has for the Internet advertisement industry. Topics include how Internet data tracking has been a central issue in data privacy debates, how the Digital...

  • Dealgroupmedia slams 'intrusive' spyware.  // Marketing Week;5/27/2004, Vol. 27 Issue 22, p26 

    Reports on the elimination of the intrusive use of advertising-supported software by online marketing agency by Dealgroupmedia in Great Britain. Plan of Microsoft to upgrade the security feautres of Windows XP to ward off the unwanted programs; Passage of anti-spyware bill in the Congress...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics