IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
151 - 175 of 1381 Matches Previous Page  |  Next Page
As A Service: IT Consumption Model for Digital Business Innovation
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: This IDC report examines how data center services providers can assist your IT organization in improving overall data center performance while enhancing resource allocation and consumption in the IT environment so that IT can facilitate digital transformation.
Posted: 24 Jan 2017 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Automated Deployment of Docker Hosts on Bare-metal Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Delve into this paper to discover how to deploy Docker hosts and execute containerized apps on bare-metal infrastructure. Designed for IT architects, admins, and DevOps developers, you'll receive a step-by-step walkthrough of the deployment process, best practices for configuration management, and more.
Posted: 17 Jan 2017 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Automating Cloud Infrastructure with Ansible IT Engine
sponsored by Red Hat
CASE STUDY: Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Red Hat

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

Benchmarking Your Internal IT Costs: Building Your IT Infrastructure Service Baseline
sponsored by Windsor Group
WHITE PAPER: This analytic white paper introduces the importance of benchmarking your internal IT costs by keeping track of your IT service baseline. Doing this can define your current IT infrastructure service cost and output, as well as act as a measurement tool for continuous improvement.
Posted: 16 Sep 2016 | Published: 01 Jul 2016

Windsor Group

Benefits of an Application Adaptive Data Infrastructure
sponsored by DataCore Software Corporation
WEBCAST: A parallel I/O storage software can handle the different levels of performance, flexibility and availability required by dynamic applications. Access now to learn about one software solution that can handle multiple vendors and reduce cost by 75%.
Posted: 09 Aug 2016 | Premiered: Aug 8, 2016

DataCore Software Corporation

BeneluxIT Priorities 2017
sponsored by ComputerWeekly.com
EGUIDE: This year's Computer Weekly and TechTarget IT Priorities survey has revealed that IT decision makers at Benelux based organisations are less confident, than counterparts in most other parts of Europe, that IT budgets will rise this year.Only 28% of them think budgets will increase.
Posted: 06 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

Authentication Best Practices: On and Off the Cloud
sponsored by HID
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

HID

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
EGUIDE: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Balancing Cost Control with Strategic Investments
sponsored by Cisco Systems, Inc.
PODCAST: Listen to this podcast as the Senior Director and Lead in the European Markets for Cisco's Internet Business Solutions Group, explores how CIOs balance cost containment with making strategic investments that will help their businesses accelerate growth today and into the future.
Posted: 16 Mar 2011 | Premiered: Mar 16, 2011

Cisco Systems, Inc.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett Packard Enterprise

Barclays Bank
sponsored by Lumension
CASE STUDY: Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.
Posted: 10 Jul 2008 | Published: 01 Jan 2007

Lumension

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Benefits of High Sensitivity with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a low-light performance video camera application that can capture detailed color images to enhance security teams' abilities to easily identify security threats indoors and outdoors.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Benefits of View-DR with the IPELA ENGINE™
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: In this white paper, discover a video system that offers high-sensitivity video quality for advanced surveillance, allowing security teams to get clear images at all times of the day.
Posted: 09 Oct 2013 | Published: 18 Jun 2013

Sony Electronics Asia Pacific Pte Ltd

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.
151 - 175 of 1381 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement