IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
126 - 150 of 4439 Matches Previous Page  |  Next Page
A Breakdown of Disaster Recovery Responsibilities
sponsored by Databarracks
WHITE PAPER: View this resource to pinpoint who is responsible for creating a disaster recovery plan, and which roles are responsible for what when a disaster strikes.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Databarracks

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM

A Checklist for Deploying Highly Efficient Infrastructure for Windows Server 2012
sponsored by Lenovo
WHITE PAPER: View this whitepaper for a checklist of five key elements to delivering significant improvement in the operational efficiency of your Windows Server 2012 environment.
Posted: 03 Mar 2015 | Published: 31 Oct 2013

Lenovo

A Checklist for Deploying Highly Efficient Infrastructure for Windows Server® 2012
sponsored by Lenovo
WHITE PAPER: View this whitepaper for a checklist of five key elements to delivering significant improvement in the operational efficiency of your Windows Server 2012 environment.
Posted: 17 Apr 2015 | Published: 31 Oct 2013

Lenovo

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

A Closer Look at Best Project Management Practices for CIOs and IT Managers
sponsored by CA Technologies.
EGUIDE: Access this e-guide to examine some of the top project management tips from the experts at SearchCIO.com. Additionally, learn how one organization's IT executive prioritizes the project pipeline and outlines the role of IT for project management.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

CA Technologies.

A closer look at ITSM and ITIL
sponsored by SearchCIO.com
EBOOK: In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SearchCIO.com

A Customer Success from the Experts in Business-Critical Continuity
sponsored by Emerson
CASE STUDY: Access this case study to learn how MTC found a way to manage their entire data center more efficiently.
Posted: 17 Apr 2015 | Published: 31 Dec 2010

Emerson

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 01 Feb 2015 | Published: 19 Aug 2014

Hewlett-Packard Company

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Introduction to RSA SecurID User Authentication
sponsored by RSA
PRODUCT LITERATURE: This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
Posted: 27 Nov 2006 | Published: 01 Nov 2006

RSA

A FIRST LOOK AT ORACLE BPM SUITE 11G
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Limited

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security
126 - 150 of 4439 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement