Hardware  >   Security Hardware  >   Network Security Hardware  >  

Biometric Devices

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Devices that provide biological identification of a person, which includes eyes, voice, handprints, fingerprints and hand-written signatures.
Biometric DevicesMultimedia (View All Report Types)
1 - 25 of 38 Matches Previous Page  | Next Page
Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Expert Integrated Systems: Can you put expertise in a box?
sponsored by IBM
PODCAST: Can you package expertise? More and more IT executives are adopting a new approach that makes it easier, faster and less expensive to deploy infrastructure and applications by integrating hardware, software and field-tested "patterns of expertise" in the form of expert integrated systems. Find out more.
Posted: 19 Mar 2013 | Premiered: Mar 18, 2013

IBM

IBM PureApplication System - Up and Running in Under 4 Hours
sponsored by IBM
WEBCAST: Watch this concise webcast to view a step-by-step implementation of IBM's PureApplication System, so you know what to expect when it shows up at your door.
Posted: 20 Feb 2014 | Premiered: May 11, 2012

IBM

Intel & Dell TCO Client Business calculator
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: Developed from industry research and insights from Intel IT, the Business Client Refresh ROI Estimator lets you explore the business value of replacing your aging PCs with new Intel® processor-based devices. Click to access it now.
Posted: 08 Apr 2014 | Premiered: 08 Apr 2014

Dell, Inc.

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

M3800 vs Macbook Pro
sponsored by Dell, Inc.
VIDEO: This quick video pits the Dell Precision M3800 against the Apple MacBook pro, comparing the features such as boot times, screen resolution, video rendering speeds, interface capabilities, and more.
Posted: 09 Apr 2014 | Premiered: 19 Dec 2013

Dell, Inc.

Optimize Your Hosted Desktop Environment with Upgraded Server Pairing
sponsored by Citrix and HP
WEBCAST: Watch this brief webcast to discover the key features of HP's newest converged infrastructure, which has enabled OGL to lower TCO, speed up the return on investment and more.
Posted: 11 Apr 2014 | Premiered: Dec 9, 2013

Citrix and HP

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Consolidate resources with IBM Virtualization
sponsored by IBM
VIDEO: This video describes how making the transition from physical to virtual resources with IBM Virtualization has the potential for significant savings.
Posted: 19 May 2011 | Premiered: 08 Apr 2010

IBM

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Forrester Webinar: Taming the Performance Beast
sponsored by Embarcadero Technologies, Inc.
WEBCAST: Smart strategies and tools for database optimization is critical to reduce costs in complex infrastructures and can help organizations defer hardware upgrades, get more out of existing systems, and improve developer and DBA productivity.
Posted: 26 Apr 2010 | Premiered: Apr 26, 2010

Embarcadero Technologies, Inc.

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Integrated Security - McAfee Software and Intel vPro Technology Video
sponsored by Intel
WEBCAST: This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more.
Posted: 28 Dec 2012 | Premiered: Dec 28, 2012

Intel

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Introducing Dell 12th Generation PowerEdge Servers
sponsored by Dell, Inc. and Intel®
VIDEO: This short video examines the importance of remote server management, especially as organizations expand globally. Discover new design features that enable you to quickly detect issues, regardless of the physical location of your data center.
Posted: 26 Jul 2012 | Premiered: 05 Mar 2012

Dell, Inc. and Intel®

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Optimizing for the Cloud with Data Center Virtualization
sponsored by Brocade
WEBCAST: Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Brocade
1 - 25 of 38 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement