...keyloggers, buffer overflows, browser hijack objects), and protocol/shell hacks. Network security management is a critical part of an organization 's information technology (IT) structure. Applications. A number of separate network security programs working...

Computer Terminals

(90 companies)
ICA) clients. A Citrix thin client is used in applications such as Citrix MetaFrame and WinFrame. The graphical user interface (GUI) of a Citrix thin client provides support for UNIX, Java, Windows and Macintosh applications, as well as browser...

Protocol Stack Software

(32 companies)
...protocol (TCP/IP) from the network interface card (NIC) to an application such as a Web browser or e-mail client. This protocol is carried across a transport mechanism such as a Cat5e network cable. Most protocol stacks operate within the open...

Security Software

(458 companies)
Anti-spyware software provides protection against: Malicious startup scripts. Exploits (e.g., buffer overflow handling). Browser help object (BHO) threats. Keyloggers. Pop-up ads. Adware injectors. Applications. Application security is a highly desirable...
...and a browser such as Internet Explorer. Web-based ECM applications provide cross-platform compatibility and support multiple concurrent users while placing fewer demands on end-user RAM. Microsoft, Windows, and Internet Explorer are registered...
...workstations, personal computers (PCs), or handheld devices such as personal digital assistants (PDAs), tablet PCs, and pocket PCs. Instead, employees use a browser to connect to a remote web server. Most PC-based applications use the Microsoft Windows...
...help companies select the best vendor for a project or product line. In many organizations, Web-based supplier relationship management (SRM) software is used to communicate with vendors in real-time. Using a web browser, a buyer can check the status...
...random access memory (RAM) and hard disk space. Language translation software that uses a proprietary operating system such as Microsoft? Windows? or Palm OS? may include plug-ins for word processors, web browsers, and email clients. Microsoft...
...own and operate specialized software which they install and maintain on their own servers. ASP customers then access tools and services through a Web browser and Internet connection, or a thin client and vendor-supplied software. Both approaches...

Retail Software

(42 companies)
...a Web browser. Retail software is designed for retail point of sale (POS), retail inventory management, retail customer relationship management (CRM), and retail accounting applications. POS retail software provides either single or multi-location...
Web-based education management software is designed for use in a browser or with a handheld device. Touch screen software for educational institutions is used at kiosks or computer monitors located around a school, learning center, college...
...and available disk space. Web-based learning management systems (LMS) use browsers such as Internet Explorer and provide remote access. Microsoft, Windows, and Internet Explorer are registered trademarks of Microsoft Corporation.

Anti-malware Software

(38 companies)
...modem to dial telephone numbers. URL injectors - Re-direct a computer 's Internet browser to a different Web site.
...workstations. Typically, users work within a Web browser such as Internet Explorer.
...document management software does not require machine-based software licenses, and provide access from multiple workstations. Typically, users work within a browser such as Internet Explorer. Selecting document management software requires an analysis...