IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
101 - 125 of 5509 Matches Previous Page  |  Next Page
5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

5 Key Initiatives to Optimize Service Delivery
sponsored by ServiceNow
WHITE PAPER: To optimize the productivity and happiness of the workforce, it's critical that they see the service desk as effective, pleasant, and easy to work with. This Forrester resource reveals 5 key initiatives that can maximize the effectiveness of your service desk.
Posted: 11 Mar 2016 | Published: 18 Sep 2015

ServiceNow

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

5 Reasons Endpoint Security Must Move to The Cloud
sponsored by CrowdStrike
WHITE PAPER: The mass migration to the cloud is proving a useful tool for expanding organizations who find themselves becoming increasingly exposed to cyberthreats. Discover why the cloud can be an ideal choice when looking to secure endpoints and what benefits it can provide your organization such as cost, flexibility, and agility.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

4G: The What, Why and When
sponsored by Tellabs
WHITE PAPER: The purpose of this paper is to: Clarify the definition of 4G from a technology perspective; present business benefits of 4G-enabled services; and Propose a realistic timeline for the adoption of a 4G standard.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Tellabs

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Best Practices: Moving From Monitoring to Blocking Content
sponsored by Intel Security
WHITE PAPER: In 2015 almost 800 data breaches hit US-based companies. Discover the 5 best practices to protect your organization.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Cloud Security Concerns You Must Address
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett Packard Enterprise

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: Keep these five considerations in mind when implementing a hybrid cloud strategy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations in Cloud Providers for Product Applications
sponsored by Dimension Data
WHITE PAPER: Cloud investment continues to skyrocket. Find out five areas to focus on to be sure you choose the right vendor.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

TOPICS:  IT Management
Dimension Data

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett Packard Enterprise

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Mainframe Myths Debunked
sponsored by Global Technology Solutions Group
EGUIDE: There are countless outdated myths surrounding mainframe computers. But how do you know what's true about the modern mainframe, and what are outdated misconceptions? This exclusive guide explores the state of the modern mainframe today, and debunks common myths.
Posted: 20 Jun 2016 | Published: 16 Jun 2016

Global Technology Solutions Group

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and Intel®

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

5 reasons why your data center is everywhere
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: In the following white paper, uncover the inherent nature of modern applications and learn how you must address your data center infrastructure to ensure your application operations are as effective and valuable as they should be. Access now to learn more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 steps to aligning IT to the needs of your organization
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: Read this white paper to uncover the five steps you can take to align your IT to the needs of your organization. Inside, uncover how to develop a vision, leverage cloud to facilitate alignment, and much more.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

CISCO & INTEL® XEON® PROCESSOR
101 - 125 of 5509 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement