IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan White Papers (View All Report Types)
151 - 175 of 702 Matches Previous Page  |  Next Page
Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 28 Jul 2014 | Published: 25 Jun 2014

IBM

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this valuable whitepaper now for a complete analysis of the SIEM market, including the strengths and cautions of 15 leading vendors.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

Complete Breakdown of the Endpoint Security Marketplace
sponsored by Webroot
WHITE PAPER: This exclusive white paper looks at the evolution of the endpoint security marketplace as it fights to limit threats that attack antivirus weaknesses, circumvent security protection, and compromise endpoint systems.
Posted: 29 Jan 2015 | Published: 16 Dec 2014

Webroot

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Coverity Scan €- Big Data Spotlight
sponsored by Coverity by Synopsys
WHITE PAPER: View this informative white paper to learn how to address critical defects. Discover how you can manage various big data projects and generate revenue.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Coverity by Synopsys

Combatting Advanced Threats with Endpoint Security Intelligence
sponsored by IBM
WHITE PAPER: Read this resource to explore an integrated approach that combines the capabilities of endpoint management with security intelligence to close gaps against a malicious threat environment.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Comparing Data Center Batteries, Flywheels, and Ultracapacitors
sponsored by Schneider Electric
WHITE PAPER: This paper explores several popular classes of batteries, compares batteries to both flywheels and ultracapacitors, and briefly discusses fuel cells.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

Schneider Electric

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication
sponsored by SafeNet, Inc.
WHITE PAPER: Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices.
Posted: 02 Nov 2009 | Published: 01 Sep 2009

SafeNet, Inc.

Confronting the Data Center Crisis: A Cost-- Benefit Analysis of the IBM Computing on Demand (CoD) Cloud Offering
sponsored by IBM
WHITE PAPER: Through IBM client interviews across several industries and other industry and workload analyses, this paper examines the benefits and costs of IBM's CoD offering for high performance business and technical computing.
Posted: 07 Dec 2009 | Published: 09 Mar 2009

IBM

Consultants: How Can You Secure Your Information with Customers?
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Contact Center Security: Moving to the True Cloud
sponsored by LiveOps
WHITE PAPER: Today, Cloud is one of the most talked about trends in the IT industry. It’s a paradigm many believe will have a widespread business impact. However, while the term “Cloud”is relatively new, one of the core components, distributed computing, is well-established.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

LiveOps

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Cool IT Equipment Efficiently to Lower Energy Use and Cut Costs
sponsored by Upsite Technologies, Inc.
WHITE PAPER: To optimize your data center infrastructure, consider these four practical best practice steps that Upsite's engineers have devised for solving cooling inefficiencies through proper airflow management.
Posted: 14 Oct 2008 | Published: 09 Oct 2008

Upsite Technologies, Inc.

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Creating an Effective Security Operations Function
sponsored by RSA
WHITE PAPER: Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM
151 - 175 of 702 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement