IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Multimedia (View All Report Types)
76 - 100 of 123 Matches Previous Page  |  Next Page
Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Remote Systems Monitoring for Power and Cooling
sponsored by Emerson Network Power
VIDEO: Discover in this video how to leverage data center remote monitoring to evaluate the health and status of your critical power and cooling equipment. Tune in to capture critical system performance data and turn it into actionable insights with alarm notifications, custom escalation plans, and proactive diagnostics.
Posted: 07 Jun 2016 | Premiered: 19 Jan 2011

Emerson Network Power

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Secure Your High-Value Assets in Half the Time
sponsored by Illumio
WEBCAST: This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general. Learn about security as a "secondary layer," removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Quest Software - Data Protection Simplified
sponsored by Dell Software
VIDEOCAST: In this videocast you'll learn about solutions for physical, virtual, cloud and application data protection and what you need to do to ensure your data is both protected and accessible.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Dell Software

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Selecting the Right Class Server UPS
sponsored by Eaton
WEBCAST: This brief video offers key insight to help you select the server-class uninterruptible power supply (UPS) that meets your short- and long-term business needs.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security
76 - 100 of 123 Matches Previous Page    2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement