Remove 2004 Remove Case Study Remove Communications Remove Security
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. Real-time audio and video communication. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way. …. Groupware and team collaboration.

Cloud 89
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. Real-time audio and video communication. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way. …. Groupware and team collaboration.

Cloud 40
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. As the industry develops, several vendors refer to advanced BAS solutions as security validation. Picus Security.

Risk 67