IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
126 - 150 of 4387 Matches Previous Page  |  Next Page
A Buyer’s Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

A Case for Chrome in the Enterprise
sponsored by Cloud Sherpas
WHITE PAPER: Access this white paper to learn about Chrome – the operating system designed for the modern internet that resolves issues associated with traditional PC models. Inside you'll discover an introduction to Chrome, including advanced use cases and the changes that have led to Chrome.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

Cloud Sherpas

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

A closer look at ITSM and ITIL
sponsored by SearchCIO.com
EBOOK: In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SearchCIO.com

A Closer Look at Microsoft Office 365 Security
sponsored by Rackspace
EGUIDE: In this e-guide, expert Dave Shackleford reviews the security pros and cons of Microsoft's cloud-based productivity suite.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Rackspace

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

A Comprehensive Guide to Network Security in 2014-2015
sponsored by Radware
WHITE PAPER: Access this comprehensive white paper for an in-depth review of what plagued security professionals in 2014, and what will continue to challenge them in 2015.
Posted: 02 Apr 2015 | Published: 26 Dec 2014

Radware

A Customer Success from the Experts in Business-Critical Continuity
sponsored by Emerson
CASE STUDY: Access this case study to learn how MTC found a way to manage their entire data center more efficiently.
Posted: 17 Apr 2015 | Published: 31 Dec 2010

Emerson

A Cyber Security Health Check
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: This informative webcast outlines how to make sure your healthcare cyber security is effective, and how to handle healthcare compliance.
Posted: 30 Jun 2015 | Premiered: Jun 30, 2015

BAE Systems Applied Intelligence (formerly SilverSky)

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Company
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett-Packard Company

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

A 15-Minute Guide to Collaborative Case Management
sponsored by EMC Corporation
WHITE PAPER: In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

EMC Corporation

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Introduction to RSA SecurID User Authentication
sponsored by RSA
PRODUCT LITERATURE: This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
Posted: 27 Nov 2006 | Published: 01 Nov 2006

RSA

A FIRST LOOK AT ORACLE BPM SUITE 11G
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Limited

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security
126 - 150 of 4387 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement