Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

signature solutions

Results 26 - 34 of 34Sort Results By: Published Date | Title | Company Name
Published By: Docusign     Published Date: Feb 18, 2015
This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.
Tags : 
esignature technologies, mcafee, salesforce, linkedin, esignature solutions
    
Docusign
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: DocuSign     Published Date: Jun 25, 2014
Innovative enterprises are implementing fully-digitized, business-critical processes with eSignature technologies to drive significant efficiencies and improve customer experience.
Tags : 
docusign, electronic signatures, reduce costs, esignatures, contract execution, enterprise applications
    
DocuSign
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security
    
FireEye
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions, bandwidth management
    
E-SignLive by Silanis
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
    
Webroot
Published By: Echosign     Published Date: Sep 19, 2011
Leading companies recognize the importance of eSignatures. This Buyer's Guide lets you know what to look for in an eSignature solutions vendor.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign
Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Previous    1 2     Next   
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.