Stories by Ellen Messmer

CenterBeam, Network Associates team up

CenterBeam, a systems integrator that installs and remotely manages Windows-based office LANs for small to mid-sized businesses, is teaming with Network Associates to provide a hosted security service for its customers.

Online B2B Exchanges Still Have a Long Way to Go

A new study shows that business-to-business online marketplaces so far have found the most use in the chemicals, energy, pharmaceuticals and steel industries, but even the top trading exchanges register limited transaction volumes between buyers and sellers.

Supply-Chain Software Meets Web-based E-commerce

For decades, corporations have been using supply-chain management (SCM) software to plan product purchases or sales, and keep track of ordered items through the shipment and billing processes. But now the advent of Web-based e-commerce is leading to a transformation in SCM. That's because retailers, distributors and manufacturers want to share logistics information by giving trading partners and even consumers direct Web access to their SCM systems. In addition, some industries, such as grocery and apparel retailing, are starting to use shared Web-based online supply chains as hosted business-to-business exchanges. And newcomers, such as Nistevo, offer specialized hosted services to outsource specific touch points in the chain, such as freight management.

Check Point Beefs Up Management Server

Check Point Software Technologies Ltd. is shipping a new version of its Provider-1 management server. The software, used by ISPs or large enterprise customers, can manage multiple installations of CheckPoint firewall/VPN and traffic-management gear through a single console.

CenterBeam, Network Associates Manage Windows 2000

CenterBeam, a systems integrator that installs and remotely manages Windows-based office LANs for small to mid-sized businesses, is teaming with Network Associates to provide a hosted security service for its customers.

CPFR: Buzzword or Reality?

At the Retail Systems 2000 conference in Chicago, everyone was talking about collaborative planning, forecasting and replenishment, or CPFR for short. This is the buzzword for online sharing of sales forecast data between buyer and seller for efficient production planning.

Online Supply Chains Creating Buzz, Concerns

A new type of business-to-business trading exchange is arising that not only allows a buyer to place a purchase order with a supplier, but also keeps an electronic trail of the items ordered through the entire shipping, logistics and billing processes.

Feds Struggle to Tame E-Commerce

The rise of e-commerce is causing U.S. government agencies all sorts of unexpected grief these days even as many of them strive to do more business online in the name of improved efficiency.

Securant Strengthens Web-Based Access Control

Securant Technologies has just started shipping a new version of its ClearTrust SecureControl software for Web-based access control, adding a "threat-detection" feature that notifies managers when suspicious or unusual behavior is detected.

ASP Specializing in Customer Service Applications

Startup eConvergent is offering customer relationship management (CRM) services designed to help companies adopt e-mail management, Web collaboration and voice-over-IP technologies more quickly and easily than they could on their own.

Energy, Oil Producers Found B2B Exchange

More than a dozen global energy and petrochemical companies, including Royal Dutch/Shell Group and Occidental Petroleum, have founded a B2B (business-to-business) trading exchange for purchasing goods.

Cisco Offers Low-End VPN, Firewall Gear

While Cisco Systems this week will take the wraps off a new line of low-end, low-cost remote-access VPN and firewall gear for small to midsize businesses, the company has left users without a common way to manage it all.

ISS Fires 'Bullet' at Viruses

ISS has developed an intrusion-detection application, code-named Bullet, that lets e-commerce companies scan a Web site visitor's PC to see if it is infected with Trojan horses, such as Back Orifice, or viruses that could be passed on to the e-commerce site.

Security Needs Spawn Services

Companies installing intrusion-detection software to protect their networks are faced with this practical question: Do we have the skills and time to keep the round-the-clock vigils the software requires?

[]