The electronic signature market has been around for more than 20 years, but it has seen significant expansion and adoption in the past decade. Highly regulated industries like financial services, insurance, government and health care have led the charge when it has come to implementing this technology because of its ability to enable digital business while keeping processes secure and compliant. Recently, the industry has experienced increased growth in the mid-market as even more small- to medium-sized businesses have started adding e-signatures to their customer-facing processes.
A December 2015 report from Forrester Research, "E-Signatures – A Few Simple Best Practices Drive Adoption" (access requires subscription), attributes this recent increase in adoption to the fact that as customers become more digital, they increasingly expect the companies they do business with to provide high-quality digital experiences. Replacing manual, paper processes with ones that are automated and electronically signed has enabled organizations of all sizes to significantly reduce cycle times, errors and costs while offering the experience customers expect.
As more businesses transition their customer transactions to the web, security is understandably a top concern. When organizations are looking at various e-signature vendors, it is not enough to simply look for an e-signature that is "ESIGN compliant" or has a certain security certification. Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. In this slideshow, Silanis, provider of e-SignLive, takes a closer look at the top electronic signature security requirements for digital transactions.
Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ... More >>
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>
Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ... More >>