IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Multimedia (View All Report Types)
151 - 175 of 425 Matches Previous Page  |  Next Page
How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

HP and United: Teaming together for a successful migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief video case study, learn how United Airlines achieved a quick IT migration of a large size and scale – all without impact from a technology perspective.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

HP helps United Airlines consolidate their IT infrastructure
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video case study examines how United Airlines was able to consolidate its IT infrastructure and fuel customer experience success with the right service. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

HP Security Solutions
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

HP's Industry Leading Offshore Capability
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast introduces an industry-leading offshore capability designed with a new age of people and applications in mind.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

How to Make Virtual Desktop Security Simpler and More Scalable
sponsored by Citrix
WEBCAST: It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users.
Posted: 26 Apr 2011 | Premiered: Apr 25, 2011

Citrix

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

How You Can Leverage CA 3Tera AppLogic
sponsored by CA Technologies.
VIDEO: Watch this video and learn how you can leverage CA 3Tera AppLogic to roll out new business applications and services faster than you thought was possible. Bring the power of the cloud to your company.
Posted: 22 Mar 2011 | Premiered: 22 Mar 2011

CA Technologies.

HP Business Service Management
sponsored by Hewlett-Packard Company
WEBCAST: HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business.
Posted: 04 Feb 2011 | Premiered: Feb 4, 2011

Hewlett-Packard Company

HP GlancePlus
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: Keep business applications running smoothly and efficiently. HP GlancePlus software arms your organization with powerful system performance monitoring and diagnostic capabilities. It enables you to easily examine system activities, identify and resolve performance bottlenecks, and tune your system for more efficient operation.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Hewlett-Packard Company

HP Mobile Application Security
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett-Packard Company

HP Network Automation 9.00 Evaluation
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett-Packard Company

Hybrid IT Service Management
sponsored by FrontRange Solutions Inc.
VIDEO: This brief, two minute video will teach you about a single-platform IT service management (ITSM) solution that provides flexible deployment options, reduces IT costs, improves service delivery, and more.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

IBM Advances Research Through Cloud Computing to Help Solve Real-World Problems
sponsored by IBM
VIDEO: Watch this video to see how IBM is helping research organizations take advantage of cloud computing solutions to help these groups do more with less.
Posted: 22 Sep 2010 | Premiered: 22 Sep 2010

IBM

IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014

IBM

IBM Cognos Online Conference for Retailers and Manufactures
sponsored by IBM
VIRTUAL SEMINAR: This 2-hour complimentary virtual seminar on performance management (PM) takes place on October 21 and continues on November 4th — Join us to learn how PM can help you improve visibility into your manufacturing business so you can reduce costs, speed delivery and efficiency, satisfy customers and create innovative new products.
Posted: 24 Sep 2009 | Premiered: 21 Oct 2009

IBM

IBM developerWorks tech talk series for cloud computing - Live technical sessions with cloud experts
sponsored by IBM
WEBCAST: Cloud computing is all the buzz in the IT world and as you begin planning your cloud adoption strategy, you must be sure that you leverage the right technologies to smooth the transition. Check out this webcast to review key insights on how to optimize your cloud computing projects.
Posted: 30 Apr 2012 | Premiered: May 1, 2012

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

IBM Lotus Complete Collaboration Express Starter Pack
sponsored by IBM
SOFTWARE DEMO: Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

IBM Lotus Sametime Demo: Unified Communications and Collaboration Solution
sponsored by IBM
SOFTWARE DEMO: IBM Lotus Sametime software provides an easy-to-use unified communications and collaboration solution with the policy controls and security features your business requires. Check out this demo to see how IBM Lotus Sametime can be used in everyday business situations to quickly and efficiently communicate and drive business success.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM
151 - 175 of 425 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement