scanning

Results 26 - 50 of 92Sort Results By: Published Date | Title | Company Name
By: PC Mall     Published Date: Mar 03, 2012
For Patterns Inc., a knitwear designer that distributes products to boutiques across the nation and whose supply chain reaches around the globe, being mobile means the ability to scan documents - no matter where - with speed and precision.
Tags : portable, mobile, remote, patterns, scanning, environment, green, portable
     PC Mall
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
     McAfee
By: McAfee     Published Date: Nov 19, 2013
This demo video introduces ClickProtect, a feature of McAfee Email Protection.
Tags : mcafee email protection, clickprotect, click-time link scanning, security
     McAfee
By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business. This competition may be good for the customers (i.e., the patients) who are demanding higher levels of care and a better overall experience. This could mean better access to new diagnostic tests, test results, and specialists who may be located far from the patient’s location. Healthcare providers need to work toward providing the same care and experience to customers in their main facilities as they do in distributed clinics, ur
Tags : 
     VMware SD-WAN by VeloCloud
By: OnBase by Hyland     Published Date: Jun 10, 2015
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organization’s scanned documents to eliminate costly process steps and free up staff time.
Tags : document capture, data validation, scanning, enterprise content management, ecm, it management, enterprise applications, data management
     OnBase by Hyland
By: Zebra Technologies     Published Date: Aug 31, 2017
Keep checkout lines moving—and your cost of ownership low—with the Zebra MP7000. Its next-generation scanning performance and data capture give you maximum POS throughput, eliminating the exceptions and delays that lead to long wait times and frustrated shoppers.
Tags : electronic coupons, barcode items, checks and document imaging, pos activities, loyalty applications, order fulfillment, productivity improvement, mobile barcodes
     Zebra Technologies
By: Zebra Technologies     Published Date: Sep 22, 2017
Whether you’re scanning products, medicine, parts or shipping labels, your data capture needs are dramatically shifting. Traceability demands more data in smaller spaces; mobile payments are on the rise; scanning multiple barcodes consumes valuable time, and there’s less tolerance for inefficiency – capabilities only imaging technology can ful?ll.
Tags : future of technology, imaging scanners, barcode technology, inventory management, fast checkouts, managing processing data, barcode readers, camera-based scanners
     Zebra Technologies
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
     F5 Networks Singapore Pte Ltd
By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware
     Dell Software
By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
     Webroot UK
By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
     Shavlik Technologies
By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business.
Tags : healthcare, patient experience, sd-wan
     VMware SD-WAN by VeloCloud
By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security
     ESET
By: Nuance     Published Date: Jul 11, 2011
By reading this document you will be able to assess the appropriate product requirements for your environment, determine acquisition costs, and understand what ongoing expenses you will bear after installing the product.
Tags : nuance, evaluating, scanning, scan, scanning solutions, prepurchase, digital copier, digital scanner
     Nuance
By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
     Intel
By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : "advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     McAfee
By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
     Zebra Technologies
By: Epson     Published Date: Feb 27, 2019
By the end of 2019, the National Archives and Records Administration (NARA) will require all U.S. federal agencies to meet stringent new standards for electronic records management. This includes a requirement that all agencies manage their records electronically to the fullest extent possible, with long-term plans to stop accepting paper-based records and archives completely by 2022
Tags : 
     Epson
By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com