scan

Results 176 - 200 of 257Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : 
firearms collection software, firearms inventory software, firearms management system, firearms tracking software
    
Epicor
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail
    
Lane Telecommunications
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
Nemx Software Corporation
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications
    
Symantec
Published By: PC Mall     Published Date: Mar 03, 2012
Many service providers are turning to Canon for their own internal needs with increasing frequency. Such is the case with ScerIS, a technology leader in providing business process optimization through software development and consulting and services.
Tags : 
canon, optimization, scanning, scan, productivity, sceris, optimization, consulting
    
PC Mall
Published By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: PC Mall     Published Date: Mar 03, 2012
This document provides step-by-step instructions on how to use your PC set up your HP Scanjet to scan to the cloud.
Tags : 
scan, scanners, productivity, cloud, network
    
PC Mall
Published By: Trend Micro SaaS     Published Date: Dec 07, 2007
Um mit dem Wachstum Schritt zu halten und allen Schülern eine Umgebung zu bieten, in der sie optimal lernen und sich entfalten können, setzen die Shakopee-Schulen im Netzwerk eine vielschichtige Sicherheitslösung ein, die alle Standorte im Bezirk verbindet. Die IT-Abteilung muss ständig Funktionalität und Kosten gegeneinander abwägen, um mit der Installation ein Höchstmaß an Qualität und Nutzen zu gewährleisten.
Tags : 
trend micro, schutz, kosten-nutzen, shakopee-schulbezirks, funktionalität, interscan, officescan, pc-cillin
    
Trend Micro SaaS
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.
Tags : 
application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback
    
IBM
Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
    
Shavlik Technologies
Published By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : 
gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
    
Trend Micro SaaS
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
Entrust Datacard
Published By: Epson     Published Date: Nov 20, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
Published By: Epson     Published Date: Nov 21, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security
    
Trend Micro SaaS
Published By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Zebra Technologies     Published Date: Jun 15, 2017
When it came time for Southwest Vermont Medical Center (SVMC) to deploy a new barcode medication administration (BCMA) system, SVMC chose a Zebra positive patient ID system consisting of barcode printers, scanners, software tools, media and labels. Since that time, over two million medication doses have been administered. Nurses have been able to achieve an average medication scan rate of over 95% and a patient identification scan rate in excess of 99% for inpatient units. Even more impressive, these results have been sustained over a five-year period.
Tags : 
patient, save lives, zebra, svmc, bcma, hospital
    
Zebra Technologies
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Las modernas soluciones, como CA Project & Portfolio Management (CA PPM), siguen superando el listón de las herramientas de gestión de la demanda de TI de última generación y proporcionan continuamente nuevas funciones que aligeran la carga del PMO, el gestor financiero, el gestor de recursos y el gestor de productos. En los últimos años, los nuevos distribuidores que buscan aprovechar el gran mercado, cada vez más influyente, de gestión de proyectos y carteras (PPM) han desarrollado módulos que “encajan” en las plataformas SaaS. Estos distribuidores declaran que sus herramientas son fáciles de instalar, de gestionar y permiten ahorrar costes al cliente. Increíble, pero cierto. Y es así para la mayoría de las organizaciones.
Tags : 
    
CA Technologies EMEA
Published By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : 
symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search