Skip to main content
 

signatures

Results 101 - 120 of 120Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management
    
Lumension
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: MineralTree     Published Date: Jan 14, 2015
A Guide to solutions that make AP simpler, safer, and more efficient. Everyday AP is an arduous process. It involves receiving and manually keying data from paper invoices, chasing approvals through e-mail and phone calls, printing paper checks to pay vendors, manually collating checks with printed invoices and purchase orders, tracking down CFOs for signatures, stuffing envelopes, applying postage, and finally, delivering the resulting stack of payments to the local post office.
Tags : 
mineraltree, finance, business, payments, process, modernize, payment, secure
    
MineralTree
Published By: OpenText GXS     Published Date: Apr 21, 2014
5 Ways to Benefit Your ROI using e-Signatures Download to learn more!
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: OpenText GXS     Published Date: Apr 21, 2014
This white paper explains the role local tax compliance plays in successful supply chain management and e-business initiatives more broadly and how leading global brands and governments are addressing this need.
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: OpenText GXS     Published Date: Apr 21, 2014
How many paper invoices do you receive every year? How many invoices come attached to emails as PDFs? What if every invoice you received came directly into your accounts payable application with all the information you need to process it. Sounds like a dream, but we can help you make it a reality. Watch this video to learn more!
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Red Earth Software     Published Date: Mar 18, 2011
Discusses why email disclaimers are needed, the different types of email disclaimers that can be used, and how to add them.
Tags : 
email disclaimer, legal disclaimer, email signature, disclaimer, disclaimers, signature, signatures, footer
    
Red Earth Software
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Sigstr     Published Date: Oct 18, 2017
The average American worker sends more than 10,000 emails each year - for a company of 500, that's more than 5 million emails sent from your domain. That's 5 million brand impressions and clickable calls-to-action you could be missing out on. Employee email signatures are a massive marketing channel you've been missing out on. Here are 28 creative email signature examples used by some of the world's leading brands.
Tags : 
    
Sigstr
Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
    
Silanis
Published By: Silanis Technology     Published Date: Sep 08, 2015
In this white paper, we share the top benefits of e-contracting with e-signatures, as articulated by customers in real estate, healthcare, retail sales, consulting and government.
Tags : 
silanis, silanis technology, esignature, signature, digital signature, crm, electronic documents, contracts
    
Silanis Technology
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
    
Tripwire
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
    
Webroot
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.