scan

Results 1 - 25 of 205Sort Results By: Published Date | Title | Company Name
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. The MP7000 is loaded with features that take scanning performance and simplicity to the next level, enabling faster-than-ever checkout in cashier-manned and self-checkout lanes, improving cashier productivity, POS throughput and the shopper experience. A smart investment, the MP7000 offers an unmatched industry-best total cost of ownership (TCO) by delivering maximum uptime and minimum power consumption in an easy-to-service design with fewer parts and components. And with Zebra's complimentary powerful management applications, you can remotely manage all of your MP7000s, no matter where they are located.
Tags : 
scanner, customer, productivity, mp7000, tco, total cost of ownership
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
When shoppers are ready to checkout at the grocery store, the last thing they want is a long wait time at the cash register. In order to meet the high expectations of today's customer, you need to keep checkout lines moving with the most efficient handling of every transaction. This means that cashiers need to be able to instantly capture bar-codes, even ones that are damaged or dirty. They need to quickly weigh produce without spending precious time positioning and re-positioning it on scale to ensure the capture of accurate weight - and cost.
Tags : 
scan, volume, barcodes, simplicity, mp7000, industry, imaging, file, zebra
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
The MP7000 is loaded with features that take scanning performance and simplicity to the next level for faster checkout lanes, increased cashier productivity and POS throughput — and a better shopping experience. To learn more about the MP7000, go to: https://goo.gl/693u8o.
Tags : 
zebra technologies, mp7000, multi, plane, scanner, webinar
    
Zebra ABM
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies
    
Ounce Labs, an IBM Company
Published By: DocuSign     Published Date: Mar 23, 2016
Expedia Cruise Ship Centers saved $76 per agreement over a 3 year period by eliminating printing, faxing, and scanning. Read this case study to see how making the switch to DocuSign for their contract renewal and new-hire paperwork process has helped them save $1.5 million.
Tags : 
    
DocuSign
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Webroot     Published Date: Nov 02, 2012
FAQs for how to break the old trade-off between effectiveness against malware and speed.
Tags : 
faqs, virus detection, endpoint security, it security, malware detection, antivirus detection, security
    
Webroot
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection, anti spyware, anti virus, application security, email security, firewalls, internet security
    
Qualys
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: HP Inc.     Published Date: Jul 17, 2017
In May of 2013 McKinsey & Company published their now famous report which outlined twelve disruptive technologies that would have a big impact by 2025. 3D printing was one of them and consumer products were a driving force. In the report, they noted that, “3D printing could have meaningful impact on certain consumer product categories, including toys, accessories, jewelry, footwear, ceramics, and simple apparel.” They predicted that “global sales of products in these categories could grow to $4 trillion a year (at retail prices) by 2025.”
Tags : 
3d manufacturing, digital printer, digital manufacturing, printer, scanning, printing solutions, 3d printer, rapid prototyping
    
HP Inc.
Published By: Symantec     Published Date: Jul 29, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam, anti spyware, anti virus, firewalls, internet security, web service security, vulnerability management
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam, anti spyware, anti virus, firewalls, internet security, web service security, vulnerability management
    
Symantec
Published By: CA WA     Published Date: May 12, 2008
The recent economic downturn and corporate scandals compounded concerns of corporate accountability and confidence in U.S businesses. To improve shareholder confidence in management’s ability to self-govern, the Federal Government implemented strict regulatory protocols to help restore accountability and improve public as well as shareholder confidence. The primary example of course is the Sarbanes-Oxley (SOX) Act of 2002 which sought lasting eradication of corporate corruption by implementing specific controls across key financial business processes.
Tags : 
ca wa, workload automation, business process automation, compliance, sox, sarbox, sarbanes oxley
    
CA WA
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.