IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures White Papers (View All Report Types)
151 - 175 of 3295 Matches Previous Page  |  Next Page
7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017


7 Ways to Make Yourself Harder to Hack
sponsored by Solarwinds MSP
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Solarwinds MSP

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn seven key features to look for when evaluating a DLP system, and how each one overlaps with the others to provide your enterprise with optimal protection.
Posted: 01 May 2017 | Published: 01 May 2017

Symantec & Blue Coat Systems

8 Reasons to Consider SaaS-Based Infrastructure Monitoring
sponsored by LogicMonitor
WHITE PAPER: On-premise monitoring systems are struggling to keep up with new computing trends. This white paper discusses the eight central reasons to why you should consider SaaS for your infrastructure monitoring purposes.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

LogicMonitor

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

8 Steps to Building Great Mobile Apps
sponsored by Salesforce
WHITE PAPER: Delivering the next generation of apps requires solid strategy, design, and execution at every step. This e-book is your guide to the eight key steps for building a mobile app. Learn about the anatomy of a successful mobile app, how they are evolving, and ensure your apps can be continuously upgraded for future success.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Salesforce

8 Things to Know About a Secure Web Gateway
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec & Blue Coat Systems

8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

7 Vital Tips for Video Meetings Sales Success
sponsored by IBM
WHITE PAPER: This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Posted: 24 Feb 2011 | Published: 29 Jan 2013

IBM

7 Ways It Pays to Move Backup to the Cloud
sponsored by Druva Software
WHITE PAPER: Gain efficiencies and achieve unprecedented cost savings with cloud-based backup. Learn how with these 7 points.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

7 Ways the Best Hyperconvergence Is Like Your Smartphone
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Is branch IT a problem for your organization? Improve management by examining best practices in another area: devices.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article explores 7 steps to guard your network against rogue users. Read on to discover the unobtrusive measures you can take to catch and stop inside threats.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

8 Advantages of Disaster Recovery in the Cloud
sponsored by Druva Software
WHITE PAPER: Remove the costly management and burden of secondary data centers. Utilize the public cloud to realize these advantages.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

8 Questions You Should Ask About Linux Systems Management
sponsored by Red Hat and JBoss
WHITE PAPER: IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started.
Posted: 29 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

8 Strategies for Business Process Automation Success
sponsored by K2
WHITE PAPER: Choosing the right business process automation solution isn't easy. Evaluate platform quality across these 8 key areas.
Posted: 19 May 2016 | Published: 19 May 2016

TOPICS:  IT Management
K2

A 15-Minute Guide to Collaborative Case Management
sponsored by EMC Corporation
WHITE PAPER: In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

EMC Corporation

A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Business Risk Approach to IT Governance
sponsored by IBM
WHITE PAPER: Learn best practices for assessing overall effectiveness in today's highly distributed organizations and how to manage IT risks. Also discover the role a centralized IT governance system can play in realizing your IT governance strategy.
Posted: 20 Jul 2016 | Published: 30 Sep 2011

IBM

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM
151 - 175 of 3295 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement