Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

scanner

Results 26 - 50 of 58Sort Results By: Published Date | Title | Company Name
Published By: PC Mall     Published Date: Mar 03, 2012
This document provides step-by-step instructions on how to use your PC set up your HP Scanjet to scan to the cloud.
Tags : 
scan, scanners, productivity, cloud, network, wireless, convergence, infrastructure, interoperability, ip networks, ip telephony, migration, network architecture, network management, network performance, remote access, remote network management, content management
    
PC Mall
Published By: PC Mall     Published Date: Mar 03, 2012
For EasCorp, a credit union that exclusively serves other credit unions, the benefits of Remote Deposit Capture were immediately apparent and they set upon a path to provide their members with a powerful set of tools to improve their business.
Tags : 
scanners, portable, portability, eascorp, canon, remote, wireless, credit, mobile
    
PC Mall
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, network security
    
Trend Micro Inc.
Published By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : 
mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner, mcafee epolicy orchestrator, mcafee global threat intelligence, vulnerability scan, mcafee risk advisor, patch tuesday, security, it management, data center
    
McAfee
Published By: Zebra Technologies     Published Date: Jun 15, 2017
When it came time for Southwest Vermont Medical Center (SVMC) to deploy a new barcode medication administration (BCMA) system, SVMC chose a Zebra positive patient ID system consisting of barcode printers, scanners, software tools, media and labels. Since that time, over two million medication doses have been administered. Nurses have been able to achieve an average medication scan rate of over 95% and a patient identification scan rate in excess of 99% for inpatient units. Even more impressive, these results have been sustained over a five-year period.
Tags : 
patient, save lives, zebra, svmc, bcma, hospital
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Aug 31, 2017
Keep checkout lines moving—and your cost of ownership low—with the Zebra MP7000. Its next-generation scanning performance and data capture give you maximum POS throughput, eliminating the exceptions and delays that lead to long wait times and frustrated shoppers.
Tags : 
electronic coupons, barcode items, checks and document imaging, pos activities, loyalty applications, order fulfillment, productivity improvement, mobile barcodes, fast retail checkout
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Sep 22, 2017
Whether you’re scanning products, medicine, parts or shipping labels, your data capture needs are dramatically shifting. Traceability demands more data in smaller spaces; mobile payments are on the rise; scanning multiple barcodes consumes valuable time, and there’s less tolerance for inefficiency – capabilities only imaging technology can ful?ll.
Tags : 
future of technology, imaging scanners, barcode technology, inventory management, fast checkouts, managing processing data, barcode readers, camera-based scanners, 1d barcodes, omni-directional reading, enhanced scanner range, data capture, 2d barcodes, high density scanner, scanner identity verification, optical character recognition, barcode capabilities, 1d to 2d scanner, omnichannel, qr code measurement
    
Zebra Technologies
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: GFI Software     Published Date: Mar 21, 2011
Read about the benefits of GFI LANguard, an award-winning solution used by thousands of customers that allows you to scan, detect, assess and rectify security vulnerabilities on your network and to secure it with minimal administrative effort.
Tags : 
gfi, network scanner, vulnerability management, patch management, network management
    
GFI Software
Published By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, network security
    
GFI Software
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: Nuance     Published Date: Jul 11, 2011
By reading this document you will be able to assess the appropriate product requirements for your environment, determine acquisition costs, and understand what ongoing expenses you will bear after installing the product.
Tags : 
nuance, evaluating, scanning, scan, scanning solutions, prepurchase, digital copier, digital scanner, productivity
    
Nuance
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud, network security
    
Qualys
Published By: IBM     Published Date: Dec 11, 2012
You've got a scanner, and you have a lot of paper to manage. Now what? Scanning documents one by one may fall short of modern approaches in terms of efficiency and time. There are plenty of solutions, but which one is right for you?
Tags : 
capture, ibm, file capture, data management, efficiency, time, technology, enterprise applications
    
IBM
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: BlackBerry     Published Date: Apr 20, 2009
Ricoh Americas Corporation (Ricoh) is a provider of document solutions, including digital imaging systems, fax machines, printers, scanners and data storage. Ricoh wanted a solution to automate service calls handled by field service technicians. They decided to create an application for the BlackBerry solution that would improve call efficiency and give technicians more control over the tasks performed during their day.
Tags : 
blackberry, ricoh, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats, security risks, security
    
Qualys
Published By: DocuSign     Published Date: Aug 09, 2016
Too often, finalizing a sale can turn into a time consuming nightmare full of tedious paperwork. After the verbal yes, sales reps and operations folks spend several days formalizing and completing the order. Your time is spent conducting repetitive administrative tasks rather than achieving revenue goals. Between the fax machine, scanner, and printer, you finally send the contract for approval to the various parties, but now you find yourself playing the waiting game.
Tags : 
sales, digital transaction, sales operations, dtm, docusign
    
DocuSign
Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security
    
Cenzic
Start   Previous    1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.