IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Multimedia (View All Report Types)
51 - 75 of 451 Matches Previous Page  |  Next Page
Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

Case Study: ING Streamlines Storage, Communications with Symantec
sponsored by Symantec Corporation
WEBCAST: Learn how Symantec helped ING Investment Management with email and document archiving, e-discovery, and compliance.
Posted: 27 Aug 2014 | Premiered: Aug 27, 2014

Symantec Corporation

Case Study: Levi Strauss & Co. Gets Comfortable with Simpana Software
sponsored by CommVault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

CommVault

Choosing a Safe and Secure Service Delivery Platform
sponsored by Citrix
WEBCAST: Graham Melville, Senior Director, Product Marketing, NetScaler introduces the new capabilities of NetScaler MobileStream technologies.
Posted: 25 Mar 2015 | Premiered: May 6, 2014

Citrix

Clearing the Air: Cloud Infrastructure Management Visibility Simplified
sponsored by CA Technologies.
WEBCAST: In this white paper, explore how IIJ Global Singapore, a subsidiary of the leading internet access and network solutions provider, leveraged a unified monitoring platform to give customers a single-pane-of-glass view. Read on to learn how this platform can increase visibility in your organization.
Posted: 29 Dec 2014 | Premiered: Oct 9, 2014

CA Technologies.

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

VMware

CA Clarity Project and Portfolio Management
sponsored by CA Technologies.
PRODUCT DEMO: Watch this in-depth product demo to learn how CA Clarity works. This project and portfolio management solution enables users to view all projects, programs, services, assets, and applications in a collection of portfolios.
Posted: 31 Mar 2010 | Premiered: 30 Mar 2010

CA Technologies.

CA eHealth Performance Manager Demo
sponsored by CA Technologies.
PRODUCT DEMO: Download this demo to learn how you can proactively monitor performance of data and voice networks, physical and virtual systems, environmentals, databases and client/server applications across IT, all from one interface, before your business is negatively impacted.
Posted: 23 Nov 2009 | Premiered: 23 Oct 2009

CA Technologies.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

Virtual Instruments

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Limited
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Limited

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Channel Success Stories: The SMB Market Case Study: KIS
sponsored by Dell PartnerDirect and Intel
PODCAST: This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market.
Posted: 15 Dec 2008 | Premiered: Dec 15, 2008, 09:00 EST (14:00 GMT)

Dell PartnerDirect and Intel

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011

Intel

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam
51 - 75 of 451 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement