managing records

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking, cyber-attacks, access control, anti spam, anti spyware, identity management, internet security, security management, risk management, database security
    
Intel Security
Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, encryption, security management, security policies, best practices, data integration, data quality, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security
    
McAfee
Published By: Nuance     Published Date: Aug 11, 2011
Read on to find out what Nuance's suite of document conversion, management, routing, and storage solutions can do to help you efficiently manage the growing mountain of paper patient records in your clinical practice.
Tags : 
healthcare, ocr, document imaging, ocr software, imaging software, document conversion, optical character recognition
    
Nuance
Published By: EMC Corporation     Published Date: Jun 14, 2013
Storage is at the heart of any data center application. Whether you’re managing hundreds of virtual machine images or millions of records, you need to be able to save, search for, and retrieve that data in the optimal amount of time. In this White Paper we’ll explore how you can manage your storage needs, optimize storage performance, and do so while saving money at the same time.
Tags : 
platforms, optimization, applications, technology, data storage, data center, managing records, networking, security, storage, data management
    
EMC Corporation
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.