IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric SignaturesReports
226 - 250 of 3513 Matches Previous Page  | Next Page
An IT Solution to Empower End Users with Self-Service
sponsored by BMC Software
VIRTUAL ENVIRONMENT: This exclusive resource is a full demo of an IT self-service solution that will empower your end users.
Posted: 20 Dec 2013 | Premiered: 20 Dec 2013

BMC Software

Analyst's take: Managing IT in an economic downturn
sponsored by ComputerWeekly.com
WHITE PAPER: As companies face the prospect of a recession, IT is even more challenged to justify and deliver value while avoiding risky projects.  This is not the time to slash budgets; instead, follow a few rules to simplify decision making and focus your investment in areas that deliver the greatest return.
Posted: 20 Oct 2011 | Published: 04 Mar 2011

ComputerWeekly.com

Analyst's take: Nucleus Research's top 10 IT predictions for 2010
sponsored by ComputerWeekly.com
WHITE PAPER: The cloud continues to drive both rapid ROI and new ISV business models.  Beyond the cloud, expect 2010 to bring greater use of analytics, automation, and CRM, and a permanent shift in structural unemployment.  Bid auf Wiedersehen to the vendors who still haven’t gotten it.
Posted: 24 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Analytics across the ecosystem
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Analytics is a key enabler for life sciences and healthcare organizations to create better outcomes for patients, customers and other stakeholders across the entire healthcare ecosystem, according to this research from IBM.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

ComputerWeekly.com

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by SearchSecurity.com
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

SearchSecurity.com

Application Performance Management for Dummies
sponsored by Riverbed Technology, Inc.
EBOOK: Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Riverbed Technology, Inc.

Application Services: Connect and grow to create seamless, secure, and context-aware experiences
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this whitepaper to learn how third-party IT services can drastically ease the pain of modernizing your IT portfolio.
Posted: 30 Jan 2013 | Published: 31 Dec 2011

Hewlett-Packard Company

An Overview and Competitive Analysis of the One-Time Password (OTP) Market
sponsored by RSA, The Security Division of EMC
WHITE PAPER: The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

RSA, The Security Division of EMC

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Anatomy of an IPv6 Unicast Address
sponsored by Command Information
PRODUCT LITERATURE: IPv6 is the next generation Internet protocol. It was designed to replace the current version, IPv4, and will bring superior reliability, flexibility and security to the Internet.
Posted: 09 Jun 2008 | Published: 01 Jan 2007

Command Information

And the Winner Is...The 2013 Impact Awards
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Antivirus Evaluation Guide
sponsored by Threat Track
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

Application Compatibility - The Key to Preparing for Windows 7
sponsored by Centrix Software
WHITE PAPER: This resource provides answers to your top Windows 7 migration questions and more. Learn how to successfully prepare for Windows 7 by determining what applications are being used before the application compatibility process even starts.
Posted: 05 Mar 2012 | Published: 22 Feb 2012

Centrix Software

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
sponsored by BlueCoat
WHITE PAPER: Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

BlueCoat

Application Rationalization Datasheet
sponsored by Apptio
WHITE PAPER: To achieve decision agility, IT organizations need a scalable way to make business sense out of disconnected financial, operational, and project data about their application portfolio. Read on to learn more about innovative solutions!
Posted: 16 Oct 2013 | Published: 15 Oct 2013

Apptio

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc

Application Security Assessment Options
sponsored by Security Innovation
EGUIDE: This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Security Innovation

Application Security in the Cloud with BIG-IP ASM
sponsored by F5 Networks
WHITE PAPER: Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

F5 Networks

Application Security Viewpoint
sponsored by Ounce Labs, an IBM Company
PODCAST: Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.
Posted: 03 Feb 2010 | Premiered: Feb 3, 2010

Ounce Labs, an IBM Company
226 - 250 of 3513 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement