sign

Results 351 - 375 of 4105Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 13, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes. Learn how organizations of all sizes in all industries around the world are suffering from what we call the “document disconnect.” Learn how this is causing significant delays and errors across critical business functions such as sales contracting and quoting, procurement, talent acquisition, and onboarding. Download this white paper to learn more.
Tags : 
adobe, talent acquisition, sales contracting, sales quoting, document disconnect
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : 
adobe, information technology, data management, business technology, document disconnect, sales management, contracts, e-signatures, quote to cash, sales contract management
    
Adobe
Published By: Adobe     Published Date: May 12, 2016
This paper reveals the benefits of using e-signatures.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures, esignatures servicwes
    
Adobe
Published By: Document Cloud for Enterprise     Published Date: Apr 23, 2015
With Adobe Document Cloud, HR teams can become more efficient in hiring, onboarding and documentation.
Tags : 
maximize hr efficiency, adobe document cloud, hr staff, hr documents, send information to candidates, electronic documents, esign, hr personnel, employee experience, digital documents, hr digital documents, benefits of adobe document cloud, adobe
    
Document Cloud for Enterprise
Published By: Document Cloud for Enterprise     Published Date: Apr 23, 2015
With Adding Adobe Document Cloud to your existing sales processes you will slash the time it takes to prepare, send out, and manage contracts.
Tags : 
sales, accelerate sales process, digital documents, cloud documents, adobe document cloud, reduce time getting sales documents, sales documents, sales contracts, close deals faster, sales team, drive business faster, esign
    
Document Cloud for Enterprise
Published By: Adobe     Published Date: Feb 05, 2013
A fully automated, cloud-based contracting process benefits organizations and meets customer demand for an exceptional user experience. Read this whitepaper to learn how Adobe can give you a solution for Web Contracting and more.
Tags : 
adobe, contracting in cloud, echosign, web contracts, business contracts
    
Adobe
Published By: Adobe     Published Date: Mar 17, 2016
With Adobe Document Cloud eSign services integrated into Microsoft Dynamics, your sales processes become even quicker.
Tags : 
adobe, esign, microsoft dynamics, crm, sales process
    
Adobe
Published By: Adobe     Published Date: Mar 17, 2016
With Adobe Document Cloud, sales teams can accelerate towards closing more deals faster.
Tags : 
adobe, sales acceleration, electronic signature, cloud, sales team
    
Adobe
Published By: Adobe     Published Date: Mar 17, 2016
With Adobe Document Cloud eSign services integrated into Salesforce, you can accelerate core sales processes and boost productivity
Tags : 
adobe, esign, electronic signature, salesforce
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2019
Digital transformation isn’t just about speeding up manual processes. It’s about improving customer and employee experiences. Adobe Document Cloud for Office 365 that includes Adobe Acrobat DC, Adobe Sign, and PDF services, integrates seamlessly with your existing business applications such as Microsoft Office and SharePoint. With this integration, you can convert paper-based processes to compelling digital experiences that impress customers and help employees work and collaborate faster. See how Adobe can help you accomplish more in less time.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 10, 2016
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe stock, adobe creative cloud, cloud, integration
    
Adobe
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation
    
McAfee
Published By: McAfee     Published Date: Sep 04, 2014
Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.
Tags : 
arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs, siem, seguridad
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Marsha Lee     Published Date: Oct 21, 2010
ATEN developed patented technology to correct a particular cable-induced distortion described as skew to cut video distortion automatically with one-way signal detection and is therefore very fast.
Tags : 
kvm switch
    
Marsha Lee
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips
    
McAfee
Published By: Sybase     Published Date: Aug 31, 2010
This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.
Tags : 
advanced ip messaging server
    
Sybase
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: BOXX     Published Date: Jun 13, 2019
Access the advanced product design series and learn how to improve your product development workflow.
Tags : 
boxx, nvidia, visual computing, visualization, simulation, product design, design workflow, cad
    
BOXX
Published By: ASME     Published Date: Oct 22, 2019
In this four-part series, explore how product development is changing, its challenges, and the new technologies being developed to transform design workflows. You will discover the new visualization techniques that drive new levels of collaboration and enable critical product decisions to be made earlier in the design process. Download the latest reports in this series, and learn how to improve design reviews, enhance decision making, and optimize your product designs.
Tags : 
    
ASME
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : 
ibm, b2b, cloud, b2b integration
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations.
Tags : 
ibm, commerce, b2b, b2b integration, ibm cloud services
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.