SEEBURGER Editors

About SEEBURGER Editors

This author has not yet filled in any details.
So far SEEBURGER Editors has created 248 blog entries.

Use Silent Setup to Automate your Infrastructure

Installing enterprise software can be an arduous task. Manually answering prompts with technical parameters in multiple environments (‘what was the IP address of the TEST database again?’) can be time consuming and error prone. Today, we’ll look at how you can use the SEEBURGER BIS silent setup in order to minimize errors, shrink install times, [...]

By | October 23rd, 2014|

Assuring your technical needs grow with you: The value of a product road map

As data patterns change, governance takes a higher priority and security becomes more complex, Financial Services Institutions are looking to invest in modernizing their transmission platforms. SEEBURGER is ready for this MFT 3.0 drive guided by our significant Banking, Insurance and Financial Services clientele around the world. M&A strategy for FSI with SEEBURGER Over the [...]

By | August 5th, 2014|

Stretching the IT Spend: Address Pain Points and gain Competitive Advantages with an FSI-specific Platform

Welcome to the first of our series of seven posts on choosing an FSI secure data transmission platform! Over the last 5 years, banking infrastructure decision makers are increasingly being faced with new legislation and compliance regulations that change how IT systems are managed and monitored. IT budgets are expended managing these changes and although [...]

By | May 8th, 2014|

SEEBURGER products and services are not vulnerable to the Shellshock Security Vulnerability

The GNU Bash ("Bourne Again Shell", /bin/bash) is reported to have security vulnerabilities nicknamed "Shellshock" CVE-2014-6271. The Shell is installed and used on nearly all Linux, Unix and MacOS X systems. There are various attack vectors known, where the weakness of the bash shell can be exploited. Among those are also unauthenticated attacks against CGI-Scripts [...]

By | April 14th, 2014|

SEEBURGER not vulnerable to Heartbleed

Here is a short Q&A about SEEBURGER products and services in response to the recently announced security threat called Heartbleed: Are SEEBURGER products affected? No. SEEBURGER products are not directly affected by the Heartbleed Open SSL issue. But we do recommend that your company review any use of Open SSL to ensure your system's security. [...]

By | April 14th, 2014|

Onboarding: How to Capture Your ROI After the Deployment

by: John Applegate So you’ve done sufficient due diligence during the software acquisition to have confidence that the solution will meet your technical requirements and the solution has been deployed.  Now what?  Job #1 is to focus on meeting business objectives.  Here are three motivating factors that should drive your focus. Focus on Business Objectives [...]

By | November 14th, 2013|

BYOD Is Not Going Away—in fact, it’s going to explode.

Bring Your Own Device (BYOD) is basically an official, unofficial or unwanted policy of employees bringing their own mobile devices to work to use for work purposes. They use their devices to access confidential company applications, data and files. BYOD exposes companies to significant risk. But it also offers companies significant opportunities. As far as [...]

By | October 17th, 2013|

Taming TCO in the financial services industry

File transfer is more than a given at the average financial institution. The Financial Services Industry (FSI) thrives on information and devours it. In one day you might send and receive files in and out of the office, down the street and across the globe, and back and forth with agents, clients, brokers and more. [...]

By | October 10th, 2013|

SAPinsider article sheds light on supply chain troubleshooting

Things like locating a customer order or figuring out why it didn’t ship in an ERP or SAP system can be, well, pretty much a mess. It can take hours to answer simple questions, concerning customers, stalling supply chains, and costing a bundle in labor costs and missed SLA deadline penalties. A little Q&A will [...]

By | October 4th, 2013|

Online security in the financial services sector is a risky business

Imagine hundreds of billions of dollars vanishing right before your eyes. Well that’s exactly what happened yesterday when someone caused the stock market to temporarily crash by hacking into AP’s Twitter feed and tweeting about a White House bombing that never happened. Unfortunately, hacking, intrusions, phishing and Internet fraud are just some of the malicious [...]

By | September 26th, 2013|