signatures

Results 101 - 124 of 124Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
    
Webroot
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management
    
Lumension
Published By: Echosign     Published Date: Oct 07, 2011
Adobe EchoSign is the leading esignature provider, delivering efficiency and security to any signing process. Learn more at a free webinar.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign
Published By: Echosign     Published Date: Sep 19, 2011
Leading companies recognize the importance of eSignatures. This Buyer's Guide lets you know what to look for in an eSignature solutions vendor.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign
Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign
Published By: Red Earth Software     Published Date: Mar 18, 2011
Discusses why email disclaimers are needed, the different types of email disclaimers that can be used, and how to add them.
Tags : 
email disclaimer, legal disclaimer, email signature, disclaimer, disclaimers, signature, signatures, footer, signature block, exchange
    
Red Earth Software
Published By: Efficient Technology, Inc.     Published Date: Mar 07, 2011
Seamlessly integrating e-signature into the sales order process will result in dramatic cost savings, improve client preception and enable organizations to scale their sales operations more effectively.
Tags : 
sales order process, manage forms library, integrate e-sign forms, data capture, custom web application, efficiency expert, automate paperwork, process design, eliminate errors, go paperless.
    
Efficient Technology, Inc.
Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code
    
GlobalSign
Published By: EchoSign     Published Date: Jun 21, 2010
Register for this live event: Date: Wednesday, August 4th, 2010 Time: 2:00pm EDT / 11:00am PDT Leading companies are signing contracts electronically because there is no faster, easier or more secure way to get agreements signed. Join our webinar, see a live product demo, and learn how electronic signatures make it easy for : •your customers can easily sign your agreements so it's easier to do business with you •your customers can quickly sign your agreements on a smart phone (i.e. Blackberry, iPhone) -- which means they can sign your agreements on the weekend or when they are out of the office •you can track and manage the status of all your agreements online •you can decrease post sale paperwork by 50% •you can make an document a signable contract by adding initial and signature fields on the fly
Tags : 
echosign
    
EchoSign
Published By: ARX (Algorithmic Research)     Published Date: Jun 10, 2010
This white paper outlines the costs associated with a paper-based approval process and can help you establish the Return on Investment (ROI) that your organization can expect by deploying a digital signature solution.
Tags : 
arx, algorithmic research, roi calculation, digital signature, tco, automated approval process
    
ARX (Algorithmic Research)
Published By: eGrabber     Published Date: Sep 21, 2009
The Internet has many free sources of leads that you can use to market your product or service. ListGrabber is a powerful sales lead capture tool that allows you to build your own lead or prospect lists from various publicly available sources of free leads on the Internet. You can capture contact lists from online directories (like yellowpages.com, superpages.com, whitepages.com), association websites, membership directories, etc. and enter them into an Excel spreadsheet or any database (ACT!, Outlook, Excel, GoldMine, etc.) This sales and marketing software enables you to: . Capture name, address, email, phone and fax number, etc of likely prospects . Automatically transfer the captured contacts into an Excel spreadsheet or any other database . Complete your online lead generation in seconds . Start your cold calling and email/telemarketing campaigns sooner . Capture contact information found in email signatures, spreadsheets and documents Cost: $249.95 Download your Trial Copy Today.
Tags : 
lead, listgrabber, act, outlook, excel, goldmine, yellowpages, whitepages, superpages, leads, lead generation, egrabber, public
    
eGrabber
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Viruses have been on the attack for more than 20 years, and the cost of dealing with them is escalating. Too many malcode (malicious code) attacks by viruses, worms, Trojans and the like are breaking through today's most prevalent system defenses: Antivirus (AV) programs. This whitepaper will discuss the full impact of virus disasters and what historically has been done to combat the problem.
Tags : 
virus, antivirus, anti-virus, anti virus, trojan, trojans, malware, worms, malcode, internet security, email security, web security, internet security systems
    
Internet Security Systems
Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness, fda, solutions, solution, electronic systems, hipaa, policy, requirements
    
Tripwire
Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management
    
ARX (Algorithmic Research)
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: