scan

Results 1 - 25 of 235Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Anaplan     Published Date: Mar 12, 2019
In this paper learn how RSA Group shortened their FP&A process by 4 months. With a 300-year heritage, RSA Group is one of the worlds leading insurance groups. The company, which has over 20,000 employees in its core markets of the U.K., Scandinavia, and Canada, focuses on general insurance and has the capability to write business across the globe. Late one night, after the team had already been planning nonstop for weeks, one of Andrew Dinwiddies colleagues slammed his fists down on his desk and said, Surely, this can be easier; surely, we can ind a solution to make this a less intense process. It was that outburst of frustration that triggered Andrew and his team to look for different solutions to their inancial planning needs and ultimately led them to the Anaplan platform.
Tags : 
    
Anaplan
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, youll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. Thats why its essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, youll enjoy better visibility, increased performance, and more flexibilityso you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices Its hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: Epson     Published Date: Feb 27, 2019
By the end of 2019, the National Archives and Records Administration (NARA) will require all U.S. federal agencies to meet stringent new standards for electronic records management. This includes a requirement that all agencies manage their records electronically to the fullest extent possible, with long-term plans to stop accepting paper-based records and archives completely by 2022
Tags : 
    
Epson
Published By: DocuSign     Published Date: Mar 23, 2016
Expedia Cruise Ship Centers saved $76 per agreement over a 3 year period by eliminating printing, faxing, and scanning. Read this case study to see how making the switch to DocuSign for their contract renewal and new-hire paperwork process has helped them save $1.5 million.
Tags : 
    
DocuSign
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Microsoft has teamed up with DocuSign to make our industry-leading eSignature apps available to businesses and consumers within Microsoft applications, making it easier than ever to stay productive. Robust apps for Outlook, Word, SharePoint, Dynamics CRM, Windows and Windows Phone are making it easier for organisations of every size, industry, and geography to quickly and securely transact business anytime, anywhere, on any device. Read this white paper to learn how you can use DocuSign for Office 365 to: - Go digital: Send and manage your documents work flow more efficiently - Save time: Eliminate paper-based processes like printing, scanning, and faxing - Increase productivity: With DocuSign for Office 365, transactions are done quickly and securely"
Tags : 
    
DocuSign UK
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Los patrones de compra de ordenadores personales para empresas estn cambiando, pues los compradores buscan mejorar la seguridad y la experiencia de los empleados al mismo tiempo. Con el aumento global en la movilidad de los empleados y la tendencia de las empresas a dirigir sus inversiones hacia las tabletas y los ordenadores porttiles, las organizaciones estn evaluando su inversin constante en los ordenadores de sobremesa . Queda claro que los compradores de ordenadores personales para empresas siguen valorando la seguridad y el rendimiento que ofrecen los equipos de sobremesa. Tambin dicen que los nuevos formatos de sobremesa, como el formato Micro , les permiten ofrecer una mejor experiencia para los empleados, lo que para ellos es casi tan importante como la seguridad. Obtenga ms informacin sobre las soluciones Dell con tecnologa Intel.
Tags : 
    
Dell EMC EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In todays hypercompetitive environment, companies cant afford to lag behind when it comes to the quality of their products. And management cant lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers measurement and inspection arsenals. Its an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your companys measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Persone, hardware e software giusti per garantire la qualit sempre La qualit e l'affidabilit non sono mai state cos important come ora. Nell'odierno ambiente ipercompetitivo le aziende non possono permettersi di rimanere indietro circa la qualit dei loro prodotti. E non si pu tornare indietro quando si tratta di adottare nuovi strumenti e tecnologie per garantire la qualit sempre. Negli ultimi due decenni la scansione 3D diventata uno strumento cruciale nella fase di misurazione e ispezione in manifattura. una tecnica metrologica in cui si nutre fiducia per la sua accuratezza, affidabilit, velocit e facilit di utilizzo. La sua natura "senza contatto" e la sua eccezionale flessibilit la rendono ideale per la misurazione di una vasta gamma di parti in una grande variet di situazioni. Un approccio efficiente alla scansione 3D consiste nel trovare l'hardware e il software adatti per ogni utente in modo da soddisfare meglio le esigenze di misurazione dell'azienda. Questo eBo
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Mar 07, 2019
Qualitt und Zuverlssigkeit sind wichtiger denn je. Angesichts der allgegenwrtigen Konkurrenzsituation knnen es sich Unternehmen nicht leisten, bei der Qualitt ihrer Produkte Abstriche zu machen. Und das Management darf nicht zgern, stets die neuesten Werkzeuge und Technologien einzusetzen, um jederzeit hchste Qualitt sicherzustellen. Das vorliegende E-Book hilft Ihnen dabei, festzustellen, ob 3D-Scannen fr Ihre Prfanforderungen geeignet ist. Auerdem erfahren Sie, wie Sie die Technologie in Ihrem Unternehmen optimal einsetzen knnen.
Tags : 
    
3D Systems
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logics SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Webroot     Published Date: Nov 02, 2012
FAQs for how to break the old trade-off between effectiveness against malware and speed.
Tags : 
faqs, virus detection, endpoint security, it security, malware detection, antivirus detection, security
    
Webroot
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner, business management
    
Panasonic Business Mobility Solutions
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today theres no such thing as one size fits all when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner, business management
    
Panasonic Business Mobility Solutions
Published By: Zendesk     Published Date: Dec 10, 2018
Sus clientes tienen ms conocimientos tcnicos que nunca y han descubierto que prefieren resolver los problemas y dudas por s mismos. Estudios realizados por ICMI durante aos han confirmado que los clientes prefieren resolver los problemas por sus propios medios y en sus canales preferidos . Adems, solo buscan una interaccin directa cuando han agotado infructuosamente las opciones de autoservicio. Esta opinin est respaldada por los datos de American Express, segn los cuales un 48 % de los clientes prefiere hablar con un representante de servicio de atencin al cliente cuando tiene que resolver problemas complicados, pero solamente un 16 % escoge el mismo mtodo de contacto para los asuntos ms simples . Este documento tiene un objetivo sencillo: queremos ayudarle a generar un portal unificado que incluya su base de conocimientos, su comunidad y sus clientes. Todo esto se puede hacer con un Centro de Ayuda como Zendesk Guide.
Tags : 
    
Zendesk
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast theres so much more than servers and endpoints. Now, youre responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If youre responsible for guarding your organizations fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Researchs analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Researchs analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attackers seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attackers first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Aug 15, 2018
"Whats your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organizations vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organizations vulnerability discovery process is and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
Est usted planificando en forma activa para la revolucin digital de RR. HH.? La revolucin digital de RR.HH. ha llegado y est avanzando a gran velocidad, y las organizaciones estn buscando formas nuevas, efectivas y productivas de cumplir con las crecientes exigencias del negocio: agilidad, acceso global 24x7, velocidad y precisin. Las organizaciones lderes saben que necesitan generar disrupcin o verse afectados por ella, por lo tanto han comenzado a crear entornos de trabajo completamente nuevos a los que llamamos la revolucin digital en el trabajo. Est cambiando la forma en que pensamos y nos relacionamos con el trabajo cotidiano.
Tags : 
    
SAP SuccessFactors
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposuresdepending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Dell PC Lifecycle     Published Date: May 22, 2018
Los patrones de compra de ordenadores personales para empresas estn cambiando, pues los compradores buscan mejorar la seguridad y la experiencia de los empleados al mismo tiempo. Con el aumento global en la movilidad de los empleados y la tendencia de las empresas a dirigir sus inversiones hacia las tabletas y los ordenadores porttiles, las organizaciones estn evaluando su inversin constante en los ordenadores de sobremesa . Queda claro que los compradores de ordenadores personales para empresas siguen valorando la seguridad y el rendimiento que ofrecen los equipos de sobremesa. Tambin dicen que los nuevos formatos de sobremesa, como el formato Micro , les permiten ofrecer una mejor experiencia para los empleados, lo que para ellos es casi tan importante como la seguridad. Obtenga ms informacin sobre las soluciones Dell con tecnologa Intel.
Tags : 
    
Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.