signature solutions

Results 26 - 35 of 35Sort Results By: Published Date | Title | Company Name

The Paperless Future of Healthcare and Life Sciences

Published By: DocuSign     Published Date: Apr 24, 2018
"The healthcare industry struggles along the entire paper trail from start to finish. The current process is slow, costly, inefficient, full of errors, vulnerable to security breaches and hurts the people they are chartered to care for. Download this complimentary whitepaper and discover how DocuSign’s eSignature solutions modernize healthcare and life sciences organizations by eliminating paper and antiquated signature processes while meeting compliance requirements and reducing costs and errors. You will learn how DocuSign helps the healthcare industry to: • Reduce turnaround times for diagnostic result documents by weeks • Cut excessive administrative expenses and eliminate manual rekeying errors • Increase efficiency by eliminating time spent sending paper forms with doctors’ signatures"
Tags : 
    
DocuSign

Salesforce.com closes 90% of deals in 1 day; 71% in one hour with DocuSign eSignature Solutions

Published By: DocuSign     Published Date: Jul 12, 2019
Managing customer information for more than 100,000 customers, salesforce.com was looking to scale and increase efficiency as the company continues to grow. By standardizing on DocuSign for electronic signature within their sales process, salesforce.com cut deal close time from an average of two days down to 90% of deals closing in 1 day; and 71% of deals closing in 1 hour.
Tags : 
    
DocuSign

Using eSignature to Enhance Existing Technology Investments

Published By: DocuSign UK     Published Date: Aug 08, 2018
"When implementing digital transformation initiatives that incorporate eSignature, organisations need to make sure they do not disrupt business processes and that their solutions work seamlessly with existing technology platforms. Download this eBook to learn how you can enhance your existing tech investments. "
Tags : 
    
DocuSign UK

Beginner’s Guide to E-Signatures for Banking

Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions, bandwidth management
    
E-SignLive by Silanis

2011 eSignature Solutions for Sales Buyer's Guide

Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign

Learn how to reduce time-to-signature in the sales process with eSignatures

Published By: Echosign     Published Date: Sep 19, 2011
Leading companies recognize the importance of eSignatures. This Buyer's Guide lets you know what to look for in an eSignature solutions vendor.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign

Advanced Attacks Require Federal Agencies to Reimangine IT Security

Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye

Improving Server Performance and Security: An Impact Comparison of Application Control and Tradition

Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension

How to Win the Battle Against Spyware with Next Generation Technology

Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security, anti spyware, anti virus
    
Process Software

FAQ: Faster Scans and Better Virus Detection—Can They Do That?

Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security, business technology
    
Webroot
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.