document security

Results 51 - 75 of 145Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: May 29, 2013
SaaS-based (Software as a Service) collaboration and information sharing repositories are paramount for secure file/document sharing – yet, not all GCs are truly aware of the benefits they can bring to an organization.
Tags : 
saas, software as a service, collaboration, information sharing, file, document sharing, secure, security
    
Intralinks
Published By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : 
enterprise, file sharing, collaboration, technology, market, security, new news, networking
    
Intralinks
Published By: M-Files     Published Date: Apr 13, 2020
81% of knowledge workers report the need to access corporate documents away from the office. Yet… 62% of workers find it challenging and time-consuming when searching for documents when working remotely. Companies need to enable knowledge workers to work from home efficiently — ensuring access to critical documents, no matter where they are stored. Balancing the need for quick access with security and information governance requirements can be a difficult task. In this eBook, find tons of statistics on how companies are failing or succeeding at enabling remote workers with access to the information they need to do their job. Learn about how businesses can enable a productive and efficient remote workforce while ensuring information governance and security are enforced.
Tags : 
    
M-Files
Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Adobe     Published Date: Feb 14, 2020
Documents are the foundation of any business. As companies strive to digitize document processes and provide better experiences for their employees and customers, IT needs solutions that integrate with - and extend the value of - the tools they've already invested in. The majority of businesses today use Microsoft applications to create, manage, and share documents both inside and outside the organization. By adding Adobe Acrobat DC to your company's existing Office 365 and SharePoint workflows, you can help users simplify day-to-day tasks and maximize productivity, while increasing document security across your organization and leveraging your Microsoft investment.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 18, 2020
Adobe Document Cloud helps organizations worldwide transform document processes and deliver compelling digital experiences to engage customers, get business done faster, and compete more effectively. Seamlessly integrating into your existing enterprise systems and business applications, Document Cloud solutions include Adobe Sign and Acrobat DC, along with mobile and web applications, flexible APIs, and turn-key integrations. Document Cloud empowers departments across your organization to increase operational efficiency, reduce risks associated with human error, and create intuitive end-to-end digital experiences.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2020
With Adobe Sign, Microsoft’s preferred e-signature solution, you can send documents for e-signature and track the signing process at every step — right from within SharePoint. With the new Adobe Sign webforms integration, you can map data collected from completed web forms back into SharePoint and easily share across teams. Watch this on-demand event to learn more about this new capability and how you can leverage the Adobe Sign for SharePoint integration to increase productivity and collaboration in your organization. During this on-demand webinar, we will show you how to: • Add powerful e-signature capabilities to any document without leaving SharePoint • Track the status of any document sent for e-signature knowing who has signed and who needs to sign next • Accelerate digital enrollment and approvals with reusable digital web forms that automatically save data and documents in SharePoint folders and lists • Minimize risks by maintaining high levels of security and compliance
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 28, 2020
With Adobe Sign, Microsoft’s preferred e-signature solution, you can send documents for e-signature and track the signing process at every step — right from within SharePoint. With the new Adobe Sign webforms integration, you can map data collected from completed web forms back into SharePoint and easily share across teams. Watch this on-demand event to learn more about this new capability and how you can leverage the Adobe Sign for SharePoint integration to increase productivity and collaboration in your organization. During this on-demand webinar, we will show you how to: Add powerful e-signature capabilities to any document without leaving SharePoint Track the status of any document sent for e-signature knowing who has signed and who needs to sign next Accelerate digital enrollment and approvals with reusable digital web forms that automatically save data and documents in SharePoint folders and lists Minimize risks by maintaining high levels of security and compliance
Tags : 
    
Adobe
Published By: Adobe     Published Date: May 07, 2020
With less deals closing in person, companies are focusing on enabling their teams to electronically send contracts, agreements, and other time-sensitive documents for signatures anytime, anywhere. Adobe Sign works seamlessly inside Microsoft Dynamics CRM, making it easy to get documents signed quickly right from mobile devices. Join our webinar on Wednesday, May 13 at 10am PT to find out how to simplify approval processes and speed time to revenue with the security and compliance you expect from Adobe. During this 30-minute webinar, we will show you how to: • Navigate the Adobe Sign Dashboard within Dynamics CRM • Create contracts ready for signatures from within Dynamics CRM • Send documents from Dynamics CRM’s Opportunity View • Use real-time tracking and contract status from within any Microsoft 365 apps
Tags : 
    
Adobe
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Tags : 
    
Amazon Web Services APAC
Published By: Oracle_Hospitality F&B     Published Date: Feb 22, 2016
The Power of the Cloud for Food and Beverage Operators discusses cloud technology and how it can help F&B operators achieve their goals. The document discusses how cloud technology can help reduce IT costs, improve data security, open locations faster, and more.
Tags : 
oracle hospitality, power of cloud, cloud systems, cloud technology, it management, knowledge management, enterprise applications, data management
    
Oracle_Hospitality F&B
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
    
SECNAP Network Security Corporation
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp
    
CDW Symantec
Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, business technology
    
Intralinks
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : 
business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
    
Citrix ShareFile
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.