scanning

Results 76 - 92 of 92Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: DocuSign     Published Date: Apr 12, 2017
Expedia CruiseShipCenters saved $76 per agreement over a 3 year period by eliminating printing, faxing, and scanning. Read this case study to see how making the switch to DocuSign for their contract renewal and new-hire paperwork process has helped them save $1.5 million.
Tags : 
     DocuSign
By: Oracle Corporation     Published Date: Mar 28, 2013
Download this data sheet for an overview of features and benefits, including a performance increase of 10x when scanning and analyzing data.
Tags : storage server, database, oracle, high capacity, sql, security, storage, data center
     Oracle Corporation
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, youíll learn how Worklight Application Scanning helps you deliver applications that arenít susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, youíll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services, it management, enterprise applications, data management
     IBM
By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : ibm, ibm mi, ibm grm, web security, internet security, application security, security
     IBM
By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
     Secure Computing
By: PEAK Technologies, Inc.     Published Date: Aug 20, 2007
Wherever there is a label on a product, there is a potential need for printer applicators. Download this whitepaper now for a thorough analysis of the complete labeling requirement, from part production to end user application, which must to be completed to determine the correct printer applicator.
Tags : barcode, barcodes, bar code, bar codes, upc, upc symbol, inventory, scan, rfid, scanning, packaging, product packaging, peak, peak technologies
     PEAK Technologies, Inc.
By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : pop3 connector, antispam filter, anti-phisihing, email security for smbs
     Visendo
By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies, document versioning, content central, browser based, web based
     Ademero
By: ICMDocs     Published Date: Mar 21, 2011
With the significant improvements in scanning technology today and the increased importance of all aspects of security, it is a good time to take another look at and update the factors that are important in selecting a scanni
Tags : scanning companies, scanning vendors
     ICMDocs
By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0, scanning, saas
     Qualys
By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
     Qualys
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
     IBM Corporation
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, security, it management
     Globalscape
By: OnBase by Hyland     Published Date: May 16, 2017
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organizationís scanned documents to eliminate costly process steps and free up staff time.
Tags : hyland, document capture, ecm, ecm solutions, erp, document scanning, documentation
     OnBase by Hyland
By: Epson     Published Date: Nov 20, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForceģ color document scanner.
Tags : 
     Epson
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
Start   Previous    1 2 3 4     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com