IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
76 - 100 of 4402 Matches Previous Page  |  Next Page
5 keys to transforming your business for speed, agility and innovation
sponsored by Axway
WHITE PAPER: Read this white paper to find out how to create an IT architecture for the digital business era and develop and deploy innovative digital business applications.
Posted: 14 Apr 2015 | Published: 23 Feb 2015

Axway

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

5 New Laws of Antimalware Protection Keep Up with Evolving Threats
sponsored by Cisco
WHITE PAPER: Continue on to this essential white paper now to uncover five laws of anti-malware protection that can keep you safe.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Cisco

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

5 Proven Ways to Motivate and Retain your Technology Team
sponsored by Pluralsight
WHITE PAPER: Building a work environment that fosters loyalty and growth is your first step towards retaining your tech staff. This white paper highlights 5 key areas that you need to pay attention to in order to retain your employees and make sure they don't seek out greener pastures.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Pluralsight

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

5 Steps to Better App Performance and End-User QoE
sponsored by Equinix
WHITE PAPER: This infopaper outlines this changing landscape and the steps necessary to ensure that your app performance has what it takes to provide the best end-user QoE possible.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Equinix

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain
sponsored by SurfWatch Labs
WHITE PAPER: The following white paper explores the most common challenges associated with backdoor security in the midst of the data explosion and provides readers with the top 5 tips on how to secure small business backdoors within the supply chain.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SurfWatch Labs

5 Top Reasons Why Project Managers Hate Their PM Tools
sponsored by Workfront
WHITE PAPER: While project management tools can be very powerful, they often fall short of helping you to be truly efficient. This information-packed resource lists the 5 most common reasons why project managers hate their PM tools, and explores what can be done to fix them.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

Workfront

5 Ways That  Data Analytics Help Healthcare Systems
sponsored by ExtraHop
WHITE PAPER: This white paper describes the benefits of the real-time healthcare system, and how one company is using wire data analytics to empower healthcare IT and provide unprecedented insight into all of an organization's wire data.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

ExtraHop

6 Key Steps to Obtain Better Geophysical Data Analysis and Operations in Data
sponsored by CyrusOne
WHITE PAPER: In this white paper, learn why colocation services can help oil and gas companies manage the explosion of data that comes with more frequent and testing analysis, while at the same time reducing costs and increasing network connectivity.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

CyrusOne

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explores 6 tips to help future-proof your data center and 6 additional reasons to consider a completely new infrastructure approach. Read on to learn how you can evaluate vendors and get ready to meet the needs the modern data center.
Posted: 24 Feb 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell India
WHITE PAPER: This white paper explores 6 tips to help future-proof your data center and 6 additional reasons to consider a completely new infrastructure approach. Read on to learn how you can evaluate vendors and get ready to meet the needs the modern data center.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Dell India

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.
76 - 100 of 4402 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement