IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
76 - 100 of 4468 Matches Previous Page  |  Next Page
5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

5 Key Success Factors for Optimising IT Infrastructure for the Modern World
sponsored by Hewlett-Packard Limited & Intel® (Processor Intel® Xeon®)
RESOURCE: Consult the following resource to uncover the 5 key success factors for optimising IT infrastructure in the modern world.
Posted: 14 Apr 2015 | Published: 27 Mar 2015

Hewlett-Packard Limited & Intel® (Processor  Intel® Xeon®)

5 New Laws of Antimalware Protection Keep Up with Evolving Threats
sponsored by Cisco
WHITE PAPER: Continue on to this essential white paper now to uncover five laws of anti-malware protection that can keep you safe.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Cisco

5 OAuth Essentials for API Access Control
sponsored by CA Technologies.
WHITE PAPER: View this resource to uncover an application programming interface (API) authentication solution fit for the enterprise. Read on for 5 things to consider before deployment.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

CA Technologies.

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover what threats to intellectual property manufacturing enterprises face, and learn what 5 practical steps you can take to protect yourself.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Strategies for Modern Data Protection
sponsored by Commvault
WHITE PAPER: Conventional backup cannot handle modern data growth. Learn how to solve this challenge and prepare for the future.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

TOPICS:  IT Management
Commvault

5 Things You Need to Know About Migrating From Windows Server 2003
sponsored by HP
WHITE PAPER: Access this white paper to discover the five things that you need to know about migrating from Windows Server 2003. Find out recommendations on how to successfully migrate your Windows Server initiative.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

HP

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

5 Ways to Cut Costs While Improving Mobile Collaboration
sponsored by BlackBerry
WEBCAST: How can companies invest in enterprise mobility to boost collaboration, when they're simultaneously exploring ways to reduce costs? This webcast explores five key areas where businesses can optimize their IT spending. Unlock strategies that will help you cut costs while improving mobile collaboration productivity.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

BlackBerry

5 Ways to Mobilize Windows Apps
sponsored by Citrix
WHITE PAPER: Learn how to boost employee productivity with Windows apps on demand. Meet the needs of today's modern workforce and empower your users with on-demand self-service to your enterprise apps.
Posted: 22 Jun 2015 | Published: 31 Jan 2014

Citrix

6 Criterions for Strong Authentication
sponsored by HID
WHITE PAPER: This white paper presents a 6-step plan to ensure stronger authentication to go beyond basic password methods. Continue reading to learn how to craft a robust authentication strategy without sacrificing user convenience.
Posted: 22 Jul 2015 | Published: 07 Jan 2015

HID

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explores 6 tips to help future-proof your data center and 6 additional reasons to consider a completely new infrastructure approach. Read on to learn how you can evaluate vendors and get ready to meet the needs the modern data center.
Posted: 24 Feb 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett-Packard Company

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

6 Critical Criteria for Small Business Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper reviews both the unique pain points faced by small businesses in regards to data protection, as well as the solution provided by Datto ALTO, the first backup and disaster recovery (BDR) solution designed specifically for small business with the power of an enterprise BDR.  And at a small business price point.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Datto, Inc.

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault
76 - 100 of 4468 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement