1. BOB'S PIC FOR CURRENT POPULAR SEARCHES:

    Here are some of the most popular key search words.  You can click on the links below to go to a report page that we have created so you can quickly catch up on this important subject.  Please CLICK HERE to give us your feedback.  Let us know if you have any suggestions for this list, or questions on how to use our MPS specific search engine.

    Thank you,

    Bob Meyer

    Dealer News

    Healthcare

    Mobile

    BOYD

    IT Services

     

  1. Articles in category: Print Security

    1-24 of 107 // 1 2 3 4 5 »
    1. RSA: Too Much Spent on Antivirus Tech

      Explore Channelnomics (Feb 25 2014)

      RSA: Too Much Spent on Antivirus Tech

      RSA, the security division of EMC, says businesses are spending too much money on ineffective antivirus products. Instead, they should invest their cash in advanced protection mechanisms and services, such as its Security Analytics. Here’s why RSA is right and wrong at the same time.

      (Read Full Article)

      Mentions:   EMC Corporation   Symantec   big data

    2. NSi Mobile

      Explore notablesolutions.com (Jan 21 2014)

      NSi Mobile

      NSi™ Mobile is a productivity app for businesses and organizations in need of extending business processes to their mobile workforces. With NSi™ Mobile, remote workers can securely send documents, photographs, and other electronic files to their accounting, healthcare, ERP or any number of other business applications. What’s more, NSi™ Mobile provides mobile workforces with the flexibility to complete business forms on their device, virtually eliminating the need for paper-based forms used today. And for teams working in the office, NSi™ Mobile offers a secure means to “on-demand” print sensitive documents to a network printer.

      nsimobile-workflow-diagram

      (Read Full Article)

      Mentions:   IBM   SAP   Notable Solutions

    3. Opportunities in managed print: turning paper cuts into big bucks

      Explore crn.com.au (Nov 7 2013)

      Opportunities in managed print: turning paper cuts into big bucks

      The famed Xerox Palo Alto Research Centre (PARC) – the research lab behind the graphical user interface and which further developed the mouse and tablet computer – made the paperless office famous in a remarkably prescient 1975 Business Week article ...

      (Read Full Article)

      Mentions:   HP   PrintFleet   Australia

    4. Océ PlotWave 750 printing system improves networking, security and usability for CAD users

      Explore Canon U.S.A (Oct 24 2013)

      Canon U.S.A., Inc., a leader in digital imaging solutions, today announced the launch of the Océ PlotWave® 750 monochrome printing system.

      (Read Full Article)

      Mentions:   Microsoft   Canon   Oce

    5. Xerox Awarded U.S. Navy Office Equipment Deal

      Explore news.xerox.com (Oct 23 2013)

      Xerox Awarded U.S. Navy Office Equipment Deal

      Continuing a long-term relationship, the U.S. Navy has awarded Xerox (NYSE: XRX) a ten-year contract worth $94 million for the onboard document needs of its vessels worldwide.

      (Read Full Article)

      Mentions:   Kevin Warren   xerox

    6. Notable Solutions Launches NSi Output Manager for Secure Office and Enterprise Print

      Explore notablesolutions.com (Oct 15 2013)

      Notable Solutions Launches NSi Output Manager for Secure Office and Enterprise Print

      Notable Solutions, a leading provider in secure information collection and output management solutions, announced today the availability of NSi™ Output Manager™, an integrated print management solution suited for office and enterprise environments in need of a convenient and secure way to control the production and delivery of printed information.

      “NSi Output Manager complements Notable Solutions’ strengths in print and electronic document capture with an integrated print management solution designed for all customers who want to reduce costs and improve operating efficiencies,” said Gabriel Schwartzman, Notable Solutions Vice President of Output Management. “So whether the information originates on a mobile device ...

      (Read Full Article)

      Mentions:   Germany   Brazil   Stockholm

    7. Nuance Webinar Highlights Managed Print Services Strategies to Maximize

      Explore Online Press Release Distribution (Oct 9 2013)

      Nuance Webinar Highlights Managed Print Services Strategies to Maximize

      To help Higher Education institutions identify how a managed print services ( MPS ) solution can dramatically reduce costs and improve productivity, Nuance Communications, a leading provider of speech and imaging solutions, is conducting a webinar ...

      (Read Full Article)

      Mentions:   HP   Photizo Group   IKON

    8. HP Enterprise Cloud Services Selected for USPS Federal Cloud Credential Exchange

      Explore www8.hp.com (Oct 8 2013)

      HP Enterprise Services today announced it has been selected by SecureKey Technologies, Inc. as a subcontractor to provide enterprise cloud services to host the United States Postal Service’s (USPS) new authentication infrastructure.

      (Read Full Article)

      Mentions:   Spain   HP

    9. Notable Solutions Awarded U.S. Army Certificate of Networthiness

      Explore notablesolutions.com (Oct 6 2013)

      Notable Solutions Awarded U.S. Army Certificate of Networthiness

      NSi AutoStore Meets Stringent Standards for Enterprise Software Solutions

      Notable Solutions, a leading provider in secure information collection and output management solutions, announced today it has been awarded the U.S. Army Certificate of Networthiness (CoN) by the U.S. Army Network Enterprise Technology Command (NETCOM).  The certification confirms that the NSi™ AutoStore® platform has met strict U.S. Army and Department of Defense (DOD) requirements for security, compatibility, supportability and sustainability required for all software products on the Army’s Enterprise Network.

      (Read Full Article)

      Mentions:   Notable Solutions

    10. The Top Priorities for SMBs

      Explore Channel EMEA (Jul 18 2013)

      The Top Priorities for SMBs

      It's not a surprise that one key area of focus for Xerox and our partners is to continue to capture managed print services (MPS) opportunities as the SMB market learns more about the advantages. Security: keeping IT secure always tops the list but as new

      (Read Full Article)

      Mentions:   xerox   Dropbox

    11. Most Enterprise Networks Riddled with Vulnerable Java Installations, Report Says

      Explore CIO.com (Jul 18 2013)

      Most Enterprise Networks Riddled with Vulnerable Java Installations, Report Says

      Most enterprise systems have more than one version of Java installed, and the vast majority of them are outdated, security firm Bit9 said.

      (Read Full Article)

    12. Who Can Pry Into Your Cloud-based Data?

      Explore CIO.com (Jul 16 2013)

      Who Can Pry Into Your Cloud-based Data?

      Can anyone access the data that you trust to the safekeeping of a cloud-computing vendor? It's a good question, made all the more relevant by the revelations regarding the National Security Agency's Prism program. So how can you best address these issues in your contract with your cloud vendor?

      (Read Full Article)

    13. 5 Security Bolstering Strategies That Won't Break the Bank

      Explore CIO.com (Jul 9 2013)

      5 Security Bolstering Strategies That Won't Break the Bank

      Today's security threats span a broad spectrum of social engineering schemes, international hackers, and insider threats like the recent NSA breach. It's easy to get overwhelmed by all of the potential threats and where money should be spent to keep up, let alone stay ahead of the curve.

      (Read Full Article)

    14. Print security: how it can help your business

      Explore channelpro.co.uk (Jul 8 2013)

      Print security: how it can help your business

      Why companies should be looking beyond protecting hard copies of documents to securing networks.

      UK firms are suffering a record number of security breaches, costing billions of pounds a year, according to a 2012 survey conducted by PricewaterhouseCoopers (PwC) of more than 400 businesses.

      (Read Full Article)

    15. The Green, Savings and Security Benefits of Managed Print Services

      Explore Managed Print Services Connect (May 16 2013)

      The Green, Savings and Security Benefits of Managed Print Services

      Despite the fact that we live in a digital age, the promise of the “paperless office” has never materialized; offices are still printing, copying and faxing documents on a daily basis. In fact, many companies have document devices from a variety of manufacturers scattered across desktops and hallways throughout the enterprise. In some cases, there’s even a device for every employee and each device may have different requirements for services and supplies. Not only is this an impediment to maximum efficiency, it increases a business’ impact on the environment.

      (Read Full Article)

      Mentions:   Staples Technology Solutions   Staples , Inc.

    16. Boosting MSP Sales With Security Services

      Explore Channelnomics (May 2 2013)

      Boosting MSP Sales With Security Services

      A good way for MSPs to turbocharge their practices is by introducing security as an attached sale to other products and services that they’re already selling.

      You’ve heard the phrase: The technology just sells itself.

      With managed security services, however, it takes a lot more than that. It takes strategic marketing and branding. It takes time, effort and patience to ramp up offerings and acquire a customer base that will reduce total cost of ownership and generate a sustainable and profitable revenue stream. And it often takes a lot of creativity.

      (Read Full Article)

    17. Printers, Routers Used as Bots in DDoS Attacks

      Explore CIO.com (May 1 2013)

      Printers, Routers Used as Bots in DDoS Attacks

      Printers, routers, IP cameras, sensors and other Internet-connected devices are increasingly used to launch large distributed denial of service attacks, security firm Prolexic warned in a report this week.

      According to Prolexic, there are several security problems with SNMP. Some versions of the protocol transmit data in human readable form and are therefore vulnerable to interception and data modification attacks. The protocol is also vulnerable to IP spoofing because the origin of transmission of an SNMP request cannot be verified. All versions of SNMP are also vulnerable to "brute force" attacks, the company said.

      (Read Full Article)

    18. IT Professionals Offered New Cloud Security Qualification

      Explore CIO.com (Apr 30 2013)

      IT Professionals Offered New Cloud Security Qualification

      Infosecurity education body (ISC)2 is collaborating with the Cloud Security Alliance (CSA) to launch a new certification the pair hope will offer cloud security professionals an important benchmark for competence in the field.

      (Read Full Article)

    19. Mcafee Spots Adobe Reader PDF-tracking Flaw

      Explore CIO.com (Apr 28 2013)

      Mcafee Spots Adobe Reader PDF-tracking Flaw

      A flaw in Adobe Reader could allow an attacker to see when and where a PDF is opened.

      (Read Full Article)

      Mentions:   Adobe Systems

    20. Managed Security Growing, Morphing to Cloud

      Explore Channelnomics (Apr 9 2013)

      Managed Security Growing, Morphing to Cloud

      Increasing threats by hackers and malware pushed the managed security services marketplace to a record high of $13 billion in 2012, according to research firm Infonetics. Over the next five years, managed security will grow 69 percent, but the source of those sales will look much different thanks to cloud computing.

      (Read Full Article)

    21. Who has Responsibility for Cloud Security?

      Explore CIO.com (Mar 25 2013)

      Who has Responsibility for Cloud Security?

      As more organizations leverage the cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts. Highly regulated business and government organizations in particular must maintain comprehensive security and compliance postures across these hybrid systems.

      (Read Full Article)

    22. Straight Talk on Security Gets Employees to Listen -- and Comply

      Explore CIO.com (Mar 25 2013)

      Straight Talk on Security Gets Employees to Listen -- and Comply

      The statistics are staggering: Last year, Symantec blocked more than 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new malware variants. Those findings, documented in the company's latest annual "Internet Security Threat Report," might cause IT leaders to wonder if they're doing everything possible to protect their organizations.

      And well they should. Security folks, in struggling to establish policies and procedures that are both effective and easy to implement, often forget a crucial step, experts say: communicating their security goals effectively, so that ...

      (Read Full Article)

    23. Failure to address document security challenges exposes European financial services firms to risk, according to Ricoh study

      Explore Managed Print Services Connect (Mar 19 2013)

      Failure to address document security challenges exposes European financial services firms to risk,  according to Ricoh study

      A study commissioned by Ricoh Europe shows that the financial services sector, which has traditionally relied on manual and paper based approaches to processing information, is under increasing pressure to securely manage growing amounts of information.

      The study also shows that:

      • Less than half (47%) in the financial services sector think their document security is better than in 2009
      • More than a quarter (25%) think it’s worse
      • Only a third are able to full audit access to documents, with the majority therefore lacking control over who might be accessing potentially sensitive information
      • Only a small proportion have overcome the ...
      (Read Full Article)

      Mentions:   Spain   France   Belgium

    24. How to Avoid BYOD Disasters

      Explore CIO.com (Mar 11 2013)

      Imagine an organization where employees are given several consecutive months of vacation every year. It sounds like a dream, but in the era of BYOD, it could also be an IT exec's worst nightmare.

      (Read Full Article)

      Mentions:   California

    1-24 of 107 // 1 2 3 4 5 »