IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal ScanReports
101 - 125 of 1086 Matches Previous Page  | Next Page
Assess IT as a service : Enterprise Cloud Services–Virtual Private Cloud, Proof of Concept
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to learn how you can test out enterprise cloud services – specifically the virtual private cloud – and see how it performs in conjunction with your current systems.
Posted: 16 Aug 2012 | Published: 16 Aug 2012

Hewlett-Packard Limited

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
BROCHURE: In this brochure, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Avoid Disastrous Data Breaches with New Security Solutions
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

Clearswift

Benefits of Threat Intelligence
sponsored by IBM
EGUIDE: This expert e-guide explores new technology that technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Balancing Cost Control with Strategic Investments
sponsored by Cisco Systems, Inc.
PODCAST: Listen to this podcast as the Senior Director and Lead in the European Markets for Cisco's Internet Business Solutions Group, explores how CIOs balance cost containment with making strategic investments that will help their businesses accelerate growth today and into the future.
Posted: 16 Mar 2011 | Premiered: Mar 16, 2011

Cisco Systems, Inc.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett-Packard Company

Barclays Bank
sponsored by Lumension
CASE STUDY: Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.
Posted: 10 Jul 2008 | Published: 01 Jan 2007

Lumension

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Benefits of High Sensitivity with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a low-light performance video camera application that can capture detailed color images to enhance security teams' abilities to easily identify security threats indoors and outdoors.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Benefits of View-DR with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a video system that offers high-sensitivity video quality for advanced surveillance, allowing security teams to get clear images at all times of the day.
Posted: 09 Oct 2013 | Published: 18 Jun 2013

Sony Electronics Asia Pacific Pte Ltd

Best Practices for Cloud Security
sponsored by Qualys
WHITE PAPER: In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Posted: 22 Jan 2013 | Published: 31 Jan 2012

Qualys
101 - 125 of 1086 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement