Make SignatureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Make Signature returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Anti-Virus Solutions
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Firewalls
 •   Enterprise Data Protection and Privacy
 •   Intrusion Prevention Solutions

Related Searches
 •   Impacts Of Make
 •   Improvement Make
 •   Make Production
 •   Make Risk
 •   Make Signature Email
 •   Make Signature Seminars
 •   Plan Make
 •   Software Make Signature
 •   Study Make
 •   Trend Make
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

What You Should Know about E-Signature Law by DocuSign, Inc.

January 19, 2012 - (Free Research)
Read this brief white paper to familiarize yourself with eSignature laws so that your company can gain a competitive edge and increase your business's productivity. 
(WHITE PAPER) READ ABSTRACT |

Optimizing ETL: The Key to Accelerating Data‐Driven Business Decisions by Syncsort

October 12, 2009 - (Free Research)
Whether you’re analyzing information from a data warehouse, reviewing click-stream data to find the latest trends, or running a query on current sales figures, the elapsed time to perform these processes means lost revenue. This article explains the steps you can take when processing your data to reduce elapsed time. 
(WHITE PAPER) READ ABSTRACT |

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You by Aladdin Knowledge Systems

August 2008 - (Free Research)
This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection. 
(WHITE PAPER) READ ABSTRACT |

Why It Pays to Use Electronic Signature by DocuSign, Inc.

January 2012 - (Free Research)
This white paper describes the many benefits of electronic signatures and how your organization can implement an eSignature system into your current contract process. 
(WHITE PAPER) READ ABSTRACT |

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation by Hexaware Technologies

October 2011 - (Free Research)
In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset. 
(CASE STUDY) READ ABSTRACT |

Bridge the Gaps in Your E-Commerce Strategy with Electronic Signatures from DocuSign by DocuSign, Inc.

April 2008 - (Free Research)
This special brief discusses the role of electronic signature technology in closing lingering workflow automation gaps to enhance an organization's overall e-commerce strategy. 
(WHITE PAPER) READ ABSTRACT |

McAfee Application Control by McAfee, Inc.

December 2012 - (Free Research)
This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Technical guide on Web Security Gateways by M86 Security

April 2011 - (Free Research)
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats. 
(EBOOK)

Validation Process and Compliance Support with IBM Maximo Asset Management in Regulated Industries by IBM

December 2010 - (Free Research)
While there is no single method to guarantee software compliance, IBM Maximo® Asset Management can provide e-signature and e-record (audit trail) capabilities that support efforts to comply with regulations and guidelines related to e-records and e-signatures. 
(WHITE PAPER) READ ABSTRACT |

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security

October 2009 - (Free Research)
Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively. 
(WHITE PAPER) READ ABSTRACT |

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool by EMC Corporation

December 2013 - (Free Research)
Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring. 
(PRODUCT OVERVIEW) READ ABSTRACT |

IBM LotusLive Engage Helps Signature Mortgage Reduce Loan Processing Time by IBM

December 2011 - (Free Research)
Signature Mortgage Corporation provides thousands of customers with low-cost and hassle-free mortgage solutions. Now with e-SignLive and LotusLive, their customers have the ability to electronically sign applications from the convenience of their home or office. Learn more about how e-SignLive increased their business success. 
(WHITE PAPER) READ ABSTRACT |

The New Reality of Stealth Crimeware by McAfee, Inc.

May 2013 - (Free Research)
This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security Management (Antimalware Technologies) Technical Guide by SearchSecurity.com

September 2013 - (Free Research)
This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months. 
(EGUIDE) READ ABSTRACT |

Signature-less Malware Detection: Finding an Evil in the Haystack by EMC Corporation

December 2012 - (Free Research)
Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats. 
(WHITE PAPER) READ ABSTRACT |

The New Status Quo: Zero-Day and Targeted APT Attacks by FireEye

July 2011 - (Free Research)
During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime. 
(VIDEO) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

The Demise in Effectiveness of Signature and Heuristic Based Antivirus by ComputerWeekly.com

February 2013 - (Free Research)
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CISO Guide to Next Generation Threats by FireEye

May 2011 - (Free Research)
The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones 
(WHITE PAPER) READ ABSTRACT |

The Paperless Office-Turning the Page on Paper Use by SpringCM

August 2008 - (Free Research)
This whitepaper explains the benefits of a paperless office using SpringCM. Learn how to establish an inbound e-mail address and fax number to capture paper and digital content, and have incoming transmissions routed to SpringCM, saving time and paper. 
(WHITE PAPER) READ ABSTRACT |

Malicious Code Detection Technologies by Kaspersky Lab

February 2008 - (Free Research)
This white paper provides an overview of the evolving combat tactics used in the antivirus battle, giving both simplified explanations of technological approaches as well as a broad chronological perspective. 
(WHITE PAPER) READ ABSTRACT |

Intelligent real-time protection and application control by SonicWALL

March 2011 - (Free Research)
It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

LinkedIn Connects with DocuSign for Salesforce by DocuSign, Inc.

January 2012 - (Free Research)
Read this brief case study of LinkedIn's implementation of DocuSign and Salesforce to speed up sales deals and receive completed contracts quicker. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts