IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal ScanWhite Papers (View All Report Types)
26 - 50 of 595 Matches Previous Page  | Next Page
A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

A New Vision for Management of Fraud and Improper Payments
sponsored by Verizon
WHITE PAPER: This white paper explores the negative impact fraud has on healthcare benefits programs. Read on to learn 5 fraud management best practices and to discover a comprehensive SaaS platform that offers real-time security assessment.
Posted: 17 Mar 2014 | Published: 31 Oct 2011

Verizon

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 25 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks UK

Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

Actively Defending Across the Cyber Kill Chain
sponsored by Global Knowledge
WHITE PAPER: This exclusive paper examines how your organization can detect an attack sooner and potentially disrupt or block it by actively defending across the cyber kill chain.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Global Knowledge

Addressing the Malware Challenge: Strategies At Work
sponsored by Sourcefire
WHITE PAPER: This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Posted: 07 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 21 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Advantage FireEye Debunking the Myth of Sandbox Security White Paper
sponsored by FireEye
WHITE PAPER: This guide debunks the myth of effective sandbox security and outlines inefficiencies within this popular strategy.
Posted: 06 Mar 2014 | Published: 31 Dec 2013

FireEye

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett-Packard Company

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Limited

Accelerating Unified Communications With an Enterprisewide Architecture
sponsored by Avaya
WHITE PAPER: To support today’s business challenges, enterprises require a new architecture for communications that is standard, loosely coupled, three-tier and centralized.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Avaya

Admiral Group ensures superb performance and scalability
sponsored by IBM
WHITE PAPER: Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.
Posted: 06 Jun 2012 | Published: 30 Jun 2011

IBM

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett-Packard Company
26 - 50 of 595 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement