IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures White Papers (View All Report Types)
26 - 50 of 3267 Matches Previous Page  |  Next Page
13 Global Security Consultancies That Matter Most And How They Stack Up
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explains how to overcome the complexity of security operations integration and enable high-speed communication between applications for the protection you need today.
Posted: 17 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

15 Popular IT and Business Certifications
sponsored by Global Knowledge
WHITE PAPER: This report reviews the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

15 Top-Paying Certifications for 2016
sponsored by Global Knowledge
WHITE PAPER: This article provides a review of the 15 top-paying certifications. Included is a brief description of each, as well as the average salary each certification commands based on the 2016 IT Skills and Salary Survey conducted by Global Knowledge in the fall of 2015.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

Global Knowledge

15 Ways Modern IT Pros are Pursuing Certification
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

2015 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your copy ofthe eighth annual Global Knowledge IT Skills and Salary Survey to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for, and much more.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Global Knowledge

2016 Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

20 Reasons to Move Backup and Disaster Recovery to the Cloud
sponsored by Druva Software
WHITE PAPER: Cloud-based platforms are the way of the future. Gain these 20 business benefits when choosing a unified cloud solution.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

2013 Impact Awards Reveal Industry Top Players
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

2015 Mobile Workforce Report: Rise of the Mobile Worker
sponsored by Dimension Data
WHITE PAPER: Find out why competitive organizations must empower workers by offering a collaborative and flexible work environment.
Posted: 12 May 2016 | Published: 12 May 2016

TOPICS:  IT Management
Dimension Data

2016 Connected Enterprise Report
sponsored by Dimension Data
WHITE PAPER: Discover the trends, insights and strategies that leading companies are using to collaborate better in the digital age.
Posted: 12 May 2016 | Published: 12 May 2016

TOPICS:  IT Management
Dimension Data

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Data Protection Vertical Industry Findings
sponsored by Intel Security
WHITE PAPER: Did you know 68% of breaches require public disclosure? Understand the trends related to data loss.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

TOPICS:  IT Management
Intel Security

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks
26 - 50 of 3267 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement