digital sign

Results 326 - 350 of 369Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware
    
Symantec Corporation
Published By: CMO.com     Published Date: Mar 09, 2016
Find out about 10 digital trends that will change our world in 2016. By filling out this form, you will be signing up for CMO.com and will have access to more content like this.
Tags : 
cmo, marketing, adobe, subscription, case study, digital trends
    
CMO.com
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Rapid manufacturing's benefits extend far beyond the upfront savings on tooling. Discover how it will improve your operations, sales and profits and why it is heralded as the next industrial revolution. In the first of a series, you will discover the benefits of the freedom to redesign your products at any stage in the life cycle.
Tags : 
plm, product design, product lifecycle management, design, redeye
    
RedEye On Demand
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Adhering to the constraints and limiting design freedoms are necessary for conventional manufacturing processes. Rapid manufacturing eliminates all of the design constraints imposed by conventional manufacturing methods. It offers designers and engineers an unprecedented freedom to design a product and its components exclusively for the desired form, fit and function.
Tags : 
scm, design, product design, plm, product lifecycle management, redeye
    
RedEye On Demand
Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code
    
GlobalSign
Published By: Recombo     Published Date: Feb 13, 2011
"Agreement Express helps us be more efficient and save our most valuable resources - time and money. Not only did we eliminate lost productivity..."
Tags : 
contract management software, i-9, digital signature
    
Recombo
Published By: Xolido Systems     Published Date: Mar 09, 2011
Free desktop application to e-Sign, Smart verify and TimeStamp documents and files
Tags : 
    
Xolido Systems
Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe
Published By: Cisco     Published Date: Feb 23, 2016
Cisco vision for the internet is one that is entering into the next generation. Connecting enterprises through rapid adoption of digital infrastructure: 5X faster than electricity and telephony. The agenda includes: Understanding the Connected Factory and its benefits to the organization's overall profitability, case studies: reducing costs, increasing quality, and maximizing productivity, the building blocks of an IoT network: unique design considerations for environments with rigid requirements.
Tags : 
technology, digital infrastructure, productivity, networks
    
Cisco
Published By: Samsung     Published Date: Feb 02, 2016
With increases in digital viewership, arenas have had to make fundamental changes to fill stadium seats. One of these is the use of digital signage for live sports.
Tags : 
samsung, digital, display, sports venues
    
Samsung
Published By: Samsung     Published Date: Feb 02, 2016
Many educational institutions are turning to digital signage to improve communication of campus issues and emergencies in a quick and efficient manner.
Tags : 
samsung, displays, digital, signage, college, communication
    
Samsung
Published By: Samsung     Published Date: Feb 02, 2016
The sensors and actuators of the Internet of Things are becoming the programming chiefs for digital signage networks.
Tags : 
samsung, sensors, internet, digital, brand, data, displays
    
Samsung
Published By: DocuSign     Published Date: Apr 24, 2018
We live in a mobile, digital era where health information is at our fingertips. With the touch of a button, patients can see test results, track prescriptions, and sign up for clinical research. And yet it still takes over a decade to bring breakthrough treatments to market. Scientific productivity must improve: clinical trials are costly and time-consuming, and regulations mandate increased scrutiny and compliance. The patients who rely on your scientific leadership are expecting more. How are you meeting their needs? While intensive research and study are still a prerequisite for success, there is a better way to develop new products and therapies. Download the eBook for best practices to drive digital adoption in life sciences.
Tags : 
    
DocuSign
Published By: OpenText     Published Date: May 26, 2017
Many companies today are looking for ways to improve their aftermarket service and support processes, as this is a key way to help improve customer satisfaction levels. Ensuring that field service teams have access to a complete digital representation of a product or piece of equipment can significantly improve the uptime and ongoing maintenance of serviceable products.
Tags : 
opentext, manufacturing, aftermarket, service, support
    
OpenText
Published By: Genesys     Published Date: Jul 13, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : 
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. Both HPE InfoSight telemetry data and ESG’s quantitative survey data show that the benefit delivered to HPE Nimble Storage customers is significant, driving: • 79% lower IT operational expenses. • 73% fewer trouble ti
Tags : 
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.