IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures White Papers (View All Report Types)
26 - 50 of 2702 Matches Previous Page  |  Next Page
15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

2015 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your copy ofthe eighth annual Global Knowledge IT Skills and Salary Survey to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for, and much more.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Global Knowledge

2015 Report: Profiling Infrastructure Leaders
sponsored by Hewlett-Packard Company
WHITE PAPER: This report, based on findings from a December 2014 through January 2015 survey, examines who can be considered the leaders, mainstream players and laggards in modern digital asset management by taking a close look at the most successful (and least successful) management practices. Learn where today's organizations stand.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

2015 Report: Profiling Infrastructure Leaders
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: This report, based on findings from a December 2014 through January 2015 survey, examines who can be considered the leaders, mainstream players and laggards in modern digital asset management by taking a close look at the most successful (and least successful) management practices. Learn where today's organisations stand.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Hewlett-Packard Limited and Intel ®

2015 State of DevOps Report
sponsored by Puppet Labs
WHITE PAPER: The following DevOps report confirms that IT performance can provide real business value. Read on and learn IT's role in delivering an optimal DevOps transformation by employing best practices and avoiding pain points.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

Puppet Labs

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

4 Dynamic Fundamentals of Portfolio Management
sponsored by Rally Software
WHITE PAPER: This white paper highlights the 4 fundamentals of successful portfolio management practice as listed above, helping you adapt to internal and external changes, take informed risks, and make the right trade-off decisions for your adaptive enterprise.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Rally Software

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014

VMware

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

2013 Impact Awards Reveal Industry Top Players
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.
26 - 50 of 2702 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement