BOB'S PIC FOR CURRENT POPULAR SEARCHES:
Here are some of the most popular search key words. You can click on the links below to go to a report page that we have created so you can quickly catch up on this important subject. Please CLICK HERE to give us your feedback. Let us know if you have any suggestions for this list, or questions on how to use our MPS specific search engine.
Articles in category: Print Security
The famed Xerox Palo Alto Research Centre (PARC) – the research lab behind the graphical user interface and which further developed the mouse and tablet computer – made the paperless office famous in a remarkably prescient 1975 Business Week article ...(Read Full Article)
Canon U.S.A., Inc., a leader in digital imaging solutions, today announced the launch of the Océ PlotWave® 750 monochrome printing system.(Read Full Article)
Continuing a long-term relationship, the U.S. Navy has awarded Xerox (NYSE: XRX) a ten-year contract worth $94 million for the onboard document needs of its vessels worldwide.(Read Full Article)
Notable Solutions, a leading provider in secure information collection and output management solutions, announced today the availability of NSi™ Output Manager™, an integrated print management solution suited for office and enterprise environments in need of a convenient and secure way to control the production and delivery of printed information.(Read Full Article)
“NSi Output Manager complements Notable Solutions’ strengths in print and electronic document capture with an integrated print management solution designed for all customers who want to reduce costs and improve operating efficiencies,” said Gabriel Schwartzman, Notable Solutions Vice President of Output Management. “So whether the information originates on a mobile device ...
To help Higher Education institutions identify how a managed print services ( MPS ) solution can dramatically reduce costs and improve productivity, Nuance Communications, a leading provider of speech and imaging solutions, is conducting a webinar ...(Read Full Article)
HP Enterprise Services today announced it has been selected by SecureKey Technologies, Inc. as a subcontractor to provide enterprise cloud services to host the United States Postal Service’s (USPS) new authentication infrastructure.(Read Full Article)
NSi AutoStore Meets Stringent Standards for Enterprise Software Solutions
Notable Solutions, a leading provider in secure information collection and output management solutions, announced today it has been awarded the U.S. Army Certificate of Networthiness (CoN) by the U.S. Army Network Enterprise Technology Command (NETCOM). The certification confirms that the NSi™ AutoStore® platform has met strict U.S. Army and Department of Defense (DOD) requirements for security, compatibility, supportability and sustainability required for all software products on the Army’s Enterprise Network.(Read Full Article)
It's not a surprise that one key area of focus for Xerox and our partners is to continue to capture managed print services (MPS) opportunities as the SMB market learns more about the advantages. Security: keeping IT secure always tops the list but as new(Read Full Article)
Can anyone access the data that you trust to the safekeeping of a cloud-computing vendor? It's a good question, made all the more relevant by the revelations regarding the National Security Agency's Prism program. So how can you best address these issues in your contract with your cloud vendor?(Read Full Article)
Today's security threats span a broad spectrum of social engineering schemes, international hackers, and insider threats like the recent NSA breach. It's easy to get overwhelmed by all of the potential threats and where money should be spent to keep up, let alone stay ahead of the curve.(Read Full Article)
Why companies should be looking beyond protecting hard copies of documents to securing networks.
UK firms are suffering a record number of security breaches, costing billions of pounds a year, according to a 2012 survey conducted by PricewaterhouseCoopers (PwC) of more than 400 businesses.(Read Full Article)
Despite the fact that we live in a digital age, the promise of the “paperless office” has never materialized; offices are still printing, copying and faxing documents on a daily basis. In fact, many companies have document devices from a variety of manufacturers scattered across desktops and hallways throughout the enterprise. In some cases, there’s even a device for every employee and each device may have different requirements for services and supplies. Not only is this an impediment to maximum efficiency, it increases a business’ impact on the environment.(Read Full Article)
A good way for MSPs to turbocharge their practices is by introducing security as an attached sale to other products and services that they’re already selling.
You’ve heard the phrase: The technology just sells itself.
With managed security services, however, it takes a lot more than that. It takes strategic marketing and branding. It takes time, effort and patience to ramp up offerings and acquire a customer base that will reduce total cost of ownership and generate a sustainable and profitable revenue stream. And it often takes a lot of creativity.(Read Full Article)
Printers, routers, IP cameras, sensors and other Internet-connected devices are increasingly used to launch large distributed denial of service attacks, security firm Prolexic warned in a report this week.
According to Prolexic, there are several security problems with SNMP. Some versions of the protocol transmit data in human readable form and are therefore vulnerable to interception and data modification attacks. The protocol is also vulnerable to IP spoofing because the origin of transmission of an SNMP request cannot be verified. All versions of SNMP are also vulnerable to "brute force" attacks, the company said.
Infosecurity education body (ISC)2 is collaborating with the Cloud Security Alliance (CSA) to launch a new certification the pair hope will offer cloud security professionals an important benchmark for competence in the field.(Read Full Article)
Increasing threats by hackers and malware pushed the managed security services marketplace to a record high of $13 billion in 2012, according to research firm Infonetics. Over the next five years, managed security will grow 69 percent, but the source of those sales will look much different thanks to cloud computing.(Read Full Article)
As more organizations leverage the cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts. Highly regulated business and government organizations in particular must maintain comprehensive security and compliance postures across these hybrid systems.(Read Full Article)
The statistics are staggering: Last year, Symantec blocked more than 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new malware variants. Those findings, documented in the company's latest annual "Internet Security Threat Report," might cause IT leaders to wonder if they're doing everything possible to protect their organizations.
And well they should. Security folks, in struggling to establish policies and procedures that are both effective and easy to implement, often forget a crucial step, experts say: communicating their security goals effectively, so that ...(Read Full Article)
Failure to address document security challenges exposes European financial services firms to risk, according to Ricoh study
A study commissioned by Ricoh Europe shows that the financial services sector, which has traditionally relied on manual and paper based approaches to processing information, is under increasing pressure to securely manage growing amounts of information.
The study also shows that:
- Less than half (47%) in the financial services sector think their document security is better than in 2009
- More than a quarter (25%) think it’s worse
- Only a third are able to full audit access to documents, with the majority therefore lacking control over who might be accessing potentially sensitive information
- Only a small proportion have overcome the ...
Imagine an organization where employees are given several consecutive months of vacation every year. It sounds like a dream, but in the era of BYOD, it could also be an IT exec's worst nightmare.(Read Full Article)
SAMSUNG Demonstrates Commitment to Healthcare Leadership With Latest Lineup of IT Products and Solutions at HIMSS 2013
New Orleans – March 4, 2013 – Samsung Electronics America, Inc., a subsidiary of Samsung Electronics Co. Ltd, today reinforced its commitment to providing innovative solutions to serve the needs of the healthcare providers at the HIMSS Annual Conference & Exhibition at the Ernest N. Morial Convention Center in New Orleans. Product specialists will be on hand all week at the Samsung booth (#4281) demonstrating a full range of information technology solutions designed for healthcare providers looking to enhance quality of care and transform the patient experience.(Read Full Article)
Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network.(Read Full Article)