IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures White Papers (View All Report Types)
51 - 75 of 3397 Matches Previous Page  |  Next Page
2017 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: With the growth in the number of allowed communication channels and the sheer volume of messages, compliance is struggling to keep up. Access this survey report to discover the top concerns about mobile communication, what compliance benefits improved archival methods can provide and more.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

2017 Network Security Report
sponsored by Ixia
WHITE PAPER: Read this network security report to gain some insight into how the landscape has changed over the past year, and learn some tips as to how you can better secure your network.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Ixia

2017 Threat Landscape Report
sponsored by Fortinet, Inc.
WHITE PAPER: Review what we've learned from the threats and exploitations attacking systems and networks across the globe in 2017 as a means for gaining critical insights into how you can better prepare your network for the cyber attacks of the future.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

3 Reasons Manufacturers Need to Upgrade to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: Read this white paper to discover how your company can upgrade to a cloud faxing platform to give your manufacturing operation a competitive advantage.
Posted: 11 Sep 2017 | Published: 24 Jul 2017

J2 Cloud Services

3 Steps to Faster EMR Adoption with Desktop Virtualization
sponsored by Imprivata
WHITE PAPER: Inside, uncover a 3-step process that will not only help you accelerate EMR adoption and achieve Meaningful Use but also provides the benefits of two extremely helpful technologies: desktop virtualization and VDI.
Posted: 04 Sep 2013 | Published: 30 Dec 2011

Imprivata

3 Ways EFSS Enables Secure Content Collaboration
sponsored by Citrix
WHITE PAPER: The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Citrix

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

2017 Outlook Report for Cloud Backup and Recovery
sponsored by Druva Software
WHITE PAPER: Cloud-based backup and recovery solutions offer cost savings without limiting data protection capabilities. Learn more.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

2017 State Of Cloud Adoption And Security
sponsored by McAfee, Inc.
WHITE PAPER: Hybrid cloud adoption grew 3x and soon 80% of IT budgets will go to cloud solutions. See additional key insights.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Components in Securing the Software-Defined Data Center
sponsored by Intel Security
WHITE PAPER: The SDDC provides benefits for enterprise IT. Meet cloud security demands while expanding visibility and protection.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

3 Key Trends in IT Infrastructure
sponsored by Dimension Data
WHITE PAPER: Discover what IT and business leaders are saying about the future of their IT infrastructure.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

3 Keys to Choosing a Document Management Vendor
sponsored by OnBase by Hyland
WHITE PAPER: In document management, your choice of vendor is everything. Find out the three crucial steps to making the right pick.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Keys to Igniting Growth With Commerce in the Cloud
sponsored by Oracle Corporation
WHITE PAPER: E-commerce is crucial to your business success. Learn how to find the right partner for simple, sustained growth.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Reasons to Consider Converged Infrastructure
sponsored by NetApp & Cisco
WHITE PAPER: A vast 90% have CI or plan to implement it in the future. Don't fall behind. Here are three reasons to make the switch.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

TOPICS:  IT Management
NetApp & Cisco

3 Steps to a Better Team of Architects, Developers and DBAs
sponsored by Dell EMC
WHITE PAPER: Your data pros have a huge impact on your entire organization. Learn how to enable world-class collaboration among them.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell EMC

3 Steps to Building a Successful ECM Project
sponsored by OnBase by Hyland
WHITE PAPER: You have a vision of an ECM project, but how do you get there? Find out the steps, from design to execution.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

3 Things to Know Before Moving Your Data to the Cloud
sponsored by Veritas
WHITE PAPER: Moving secondary data to the cloud seems simple. Take three steps to prevent a host of negative consequences.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Tips Before Hitting Accept on Your Public Cloud Contract
sponsored by Veritas
WHITE PAPER: Be sure to understand three key points about how your public cloud provider will handle your data and your relationship.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

3 Ways IT Can Accelerate Business Success
sponsored by Cherwell
WHITE PAPER: IT teams that leverage these three tactics will be proven as a significant function of the business.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

TOPICS:  IT Management
Cherwell
51 - 75 of 3397 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement