IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
1 - 25 of 1382 Matches Previous Page  |  Next Page
10 Facts Every I&O Pro Should Know About Cloud Economics
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Are you making the most of your cloud investments? Discover in this Forrester report the core principles of strategic cloud use, and from it you will glean the 10 most important facts every I&O professional should know about cloud economics.
Posted: 27 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

10 Principles of Database Security Program Design
sponsored by Trustwave
WHITE PAPER: Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.
Posted: 03 Oct 2016 | Published: 31 Dec 2015


11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This easy-to-follow guide takes you through the 11 steps that enterprises can take in order to learn, not only the benefits, but how to mitigate the dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016


2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016


2016 Global Server Hardware, Server OS Reliability Report
sponsored by SAP/Lenovo/Intel
ANALYST REPORT: Explore the findings of the ITIC's 2016 Global Server Hardware and Server OS Reliability Survey, and discover what executives and IT managers from over 600 organizations are saying about the most common causes of downtime—and the most reliable servers on the market.
Posted: 09 Sep 2016 | Published: 31 Jul 2015


2016 ITSSM Vendor Evaluation
sponsored by ServiceNow
ANALYST REPORT: In this 2016 expert analysis, Gartner breaks down each vendor's strengths and cautions as well as focuses on vendors that offer not only IT service support functions but also next-generation support capabilities specific to mobility.
Posted: 30 Aug 2016 | Published: 24 Aug 2016


2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.
sponsored by
EZINE: In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

3 Steps to IT Resilience
sponsored by Zerto
WEBCAST: Explore three steps you can take to support IT resilience across the enterprise and discover a virtual replication platform that takes DR to the next level with IT resilience across virtual environments and clouds to support increasingly aggressive business needs.
Posted: 24 Oct 2016 | Premiered: Sep 13, 2016


4 Business Continuity Planning Essentials
sponsored by Datto
EBOOK: Clue into four essential and interconnected aspects of effective BC/DR planning. In this e-book, learn how to craft a strategy for continuity of operations that will ensure employee safety and well-being, enable IT uptime with DRaaS, and more.
Posted: 11 Oct 2016 | Published: 11 Oct 2016


10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014


10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013


10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Questions to Ask Your File Gateway Consolidation Vendor
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015


10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by Dell, Inc.
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

2016 State of Crowdsourced Innovation
sponsored by Spigit
WHITE PAPER: Read this report to discover the 2016 landscape of crowdsourced innovation, highlighting essential best practices for running sustainable innovation programs. Download now to learn why enterprises are tapping crowdsourcing as a way to innovate, and what returns you should expect.
Posted: 22 Jun 2016 | Published: 22 Jun 2016


3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014


451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014


5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

1 - 25 of 1382 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement