IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric SignaturesReports
201 - 225 of 3513 Matches Previous Page  | Next Page
Airline IT Trends Survey
sponsored by ComputerWeekly.com
WHITE PAPER: For the 11th year in succession, the Airline IT Trends Survey tracks the key technology trends in the airline industry. It demonstrates the role that the survey’s global benchmarks play in underlining the importance of IT within the airline industry, while also stimulating debate in boardrooms worldwide about the way ahead.
Posted: 24 Oct 2011 | Published: 24 Jun 2010

ComputerWeekly.com

ALDM: Analytics for Logical Dependency Mapping: Service Engagement Guide
sponsored by IBM
WHITE PAPER: This whitepaper cites IT discovery as the first step in improving IT efficiency and lowering costs and offers up a full analysis of one solution.
Posted: 18 Mar 2014 | Published: 11 Sep 2013

IBM

AlienVault Unified Security Mangement: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Align IT Operations with Business Priorities
sponsored by BMC Software
WHITE PAPER: This whitepaper covers the obstacles of modernizing your data center, a solution for doing so and the benefits of making the shift.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

BMC Software

An Innovative Infrastructure to Capture the Value of the Internet of Everything
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource details four major questions business leaders are asking as IT scrambles to keep up with growing demands.
Posted: 03 Apr 2014 | Published: 12 Dec 2013

Cisco Systems, Inc.

An Introduction to HP's Site Visit Program
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Agentless Security for Vmware Virtual Data Centers and Cloud
sponsored by Trend Micro
WHITE PAPER: This resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Akershus University Hospital: Safeguarding patient privacy with security information and event management
sponsored by RSA, The Security Division of EMC
CASE STUDY: Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
Posted: 20 Aug 2009 | Published: 17 May 2009

RSA, The Security Division of EMC

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

Aligning Security to Provide the Anticipated Business Results
sponsored by AT&T Corp
WHITE PAPER: This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

AT&T Corp

All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company
sponsored by IBM
WHITE PAPER: You've decided to make the leap to the cloud, but with so many different configurations offered by multiple providers representing different degrees of benefits and risks, how do you even begin to determine the approach that will best suit your organisation's unique needs? Read this white paper to find guidance to help you make sense of the cloud.
Posted: 31 Jul 2012 | Published: 29 Feb 2012

IBM

All New 2010 Intel® Core™ vPro™ Processor Family Brochure
sponsored by Intel
BROCHURE: Learn more about the cost-saving manageability, smart security, intelligent performance and broad industry support delivered by the all new 2010 Intel Core processor family.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

Intel

All Qualified Security Assessors Are Not Created Equal
sponsored by AT&T Corp
WHITE PAPER: The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

All the Ingredients for a Solid Security Incident Response Plan
sponsored by Dell SecureWorks
EGUIDE: Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Dell SecureWorks

AMD and HP are Proven in Business: A Decade of Industry-Leading Technology Innovation
sponsored by AMD, Hewlett-Packard and Microsoft
WHITE PAPER: AMD and HP have collaborated to deliver an outstanding technology portfolio — from the desktop to the datacenter — that continues to grow more robust every year. Using AMD Opteron processors, HP delivers server designs that offer high performance, while at the same time helping to reduce power and cooling requirements. Read this paper for more.
Posted: 09 Aug 2010 | Published: 04 Aug 2010


America's Quest for IPv6 - Part I: A Business Perspective
sponsored by Command Information
WHITE PAPER: This paper emphasizes that American organizations must adopt IPv6 today and describes the features and functions that will keep them competitive on the global stage.
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace
sponsored by Command Information
WHITE PAPER: the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights...
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

Amplifying the Signal in the Noise of IT Monitoring
sponsored by Zenoss, Inc.
WHITE PAPER: This case study details the value of moving past the traditional, fragmented approach to IT monitoring.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

Zenoss, Inc.

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

An EMC Perspective on Data De-Duplication for Backup
sponsored by EMC Corporation
WHITE PAPER: This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
Posted: 19 Jun 2008 | Published: 01 May 2008

EMC Corporation

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

Virtual Computer, Inc.

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation
201 - 225 of 3513 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement