IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
126 - 150 of 1107 Matches Previous Page  |  Next Page
Best Practices for Improving Mobile Data Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

SearchSecurity.com

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Best Practices for the Next-Generation Data Centre
sponsored by Dimension Data
WHITE PAPER: This white paper discusses some of the best practices organizations can adopt to ensure that their journey to the next-generation data center remains on track.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

Dimension Data

BIMODAL IT: The Path to Agility
sponsored by Red Hat
RESOURCE: In the following informative infographic, learn how a bimodal approach to IT can enable far greater IT agility at a manageable cost.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Red Hat

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Best Practices For Your Threat Management Program
sponsored by IBM
EGUIDE: In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
Posted: 26 Nov 2013 | Published: 26 Nov 2013

IBM

Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
sponsored by CipherCloud
WHITE PAPER: Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

CipherCloud

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Beyond Job Scheduling:The Road To Enterprise Process Automation
sponsored by UC4 Software, Inc
WHITE PAPER: This white paper demonstrates the ever-increasing value of enterprise process automation and outlines a set of requirements for truly achieving it.
Posted: 11 Aug 2011 | Published: 31 Dec 2010

UC4 Software, Inc

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

BI Deployments: What You Need For Fast and Demonstrable ROI
sponsored by Dimensional Insight, Inc.
WHITE PAPER: This white paper features a fountain of information on what the right BI/analytics application can do for your organization. Discover the ways an intuitve program can efficiently carry out everyday tasks such as retrieving, analyzing, transforming and reporting data for BI, while getting the most for your bottom line.
Posted: 23 Mar 2015 | Published: 28 Mar 2014


BI for Small and Mid-sized Businesses
sponsored by LogiXML
WHITE PAPER: This paper dispels some myths about BI in smaller companies and outlines the main options at your disposal.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

LogiXML

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

Boost IT Visibility & Value with Service Catalog
sponsored by ServiceNow
WHITE PAPER: Find out how creating a great service catalog can help prove the value of IT, and why many consider it fundamental.
Posted: 19 May 2014 | Published: 30 Apr 2013

ServiceNow

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified
126 - 150 of 1107 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement