Results for Policies

Pegasystems Helps Insurers Build Profits, New Business

Pegasystems Inc. is shipping a BPM-rooted solution aimed at helping insurers drive new business and retain existing accounts. The 'New Business Backbone' helps automate many manual processes by integrating BPM, Best Practices and case management features.

Full Story >

MuleSource Upgrades Open Source ESB for Enterprise SOA

MuleSource is shipping an upgrade to its enterprise-class open source Mule ESB. Mule 2.1 Enterprise, comes with new premium connectors for major enterprise packages, as well as support for the Mule RESTpack, and valuable retry policies designed for enterprise SOA deployments.

Full Story >

WebLayers Center Modernizes Legacy for SOA Governance

WebLayers Inc. has released an upgrade to its WebLayers Center automated SOA Governance tools, with a focus on helping organizations modernize their legacy applications by taking a more comprehensive approach to SOA Governance as they move to SOA.

Full Story >

Sendmail Raises Bar on Integrated Mail Security

Sendmail Inc. is offering mail admins one-stop help in their never-ending battle to secure their mail systems from ever-broadening, complex attacks. Mailstream Manager sports an integrated console for anti-virus, anti-spam, anti-phishing, all controllable from a central console using a highly configurable XML-like scripting language to set security and filtering policies.

Full Story >

XACML -- A No-Nonsense Developer's Guide

OASIS has just adopted XACML as an open standard to help developers build interoperable access controls security for XML documents and end-to-end transactions. In this story, we provide a developer's guide to XACML, including reasons to use it, how to use it and when to get free (and Open) sample code.

Full Story >

Vendors Issue 2003 Web Services Security Agenda

With the adoption of the WS-Security spec imminent, Microsoft, IBM and other WS-I members will push "up-the-stack" in 2003 to address two key web services security issues -- setting and managing security policies and communications between trusted partners. Take a look at the six new high-level security proposals on the table.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 6 of 6