IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric SignaturesReports
176 - 200 of 4245 Matches Previous Page  | Next Page
A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

A Quick Guide to Navigating the SSL VPN Technical Primer
sponsored by Dell Software
WHITE PAPER: Use this primer to quickly find answers to many common questions about SSL VPNs, and understand the many advantages of this technology for secure mobile access.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

Dell Software

A Risk Advisor Tool to Keep Hackers at Bay
sponsored by IBM
ASSESSMENT TOOL: Access this resource to discover a FTP risk advisor tool that will assist you in navigating the threat landscape.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

IBM

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

IBM

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A Tale of Two Workloads
sponsored by Rackspace
WHITE PAPER: Explore this informative resource to learn about one possible solution that you can leverage with existing VMware vSphere to build a hybrid cloud infrastructure for your organization. Read on now to learn more.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

Rackspace

A Unified Model for Describing a Project Plan
sponsored by Global Knowledge
WHITE PAPER: This paper proposes a unifying model for project plans. A distinction will be made between the outputs of project planning and the project plan itself. The significance of this distinction is to allow projects of all types to be described at a high level, in a common language, regardless of the type of analysis used to develop the plan.
Posted: 29 Jul 2013 | Published: 05 Jun 2013

Global Knowledge

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Superior Hardware Platform for Server Virtualization
sponsored by Intel Corporation
TECHNICAL ARTICLE: Server virtualization is helping IT organizations improve data center productivity in fundamental ways. To gain the full value of virtualization, you need servers that are built to handle the heavy and ever-changing demands of a virtualized and consolidated computing environment. Read on to learn more . . .
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Intel Corporation

A Superior Hardware Platform for Server Virtualization - Improving Data Center Flexibility, Performance and TCO with the Intel® Xeon® Processor 5500 Series
sponsored by Insight & Intel
PRODUCT OVERVIEW: To gain full value of virtualization, you need servers that are built to handle the heavy and ever-changing demands of a virtualized and consolidated computing environment. To help you get maximum benefits from virtualization, Intel has built a better physical server platform with unique hardware-assist features to enhance the virtual data center.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Insight & Intel

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

A Unified Approach to Managing the Virtual Infrastructure
sponsored by Forsythe
WHITE PAPER: Managing the virtual infrastructure end-to-end is becoming more challenging as virtual environments continue to grow and more data center elements meld into the "cloud". This whitepaper will discuss the push for continued virtualization and the "cloud", and present you with questions that will help you create the best organizational strategy.
Posted: 23 Nov 2009 | Published: 23 Nov 2009

Forsythe

A Whirlwind Tour of Wireless Vulnerabilities
sponsored by AirMagnet
PRESENTATION TRANSCRIPT: This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AirMagnet

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Aberdeen Report: Achieving Quality across the Global Manufacturing Network
sponsored by Infor
WHITE PAPER: Companies that are disciplined in managing the quality of their engineering, manufacturing, purchasing and human resource operations perform better. Read this white paper today to learn what strategic actions organizations can take to improve q...
Posted: 10 Nov 2006 | Published: 01 Dec 2005

Infor
176 - 200 of 4245 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement