IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal ScanReports
151 - 175 of 1191 Matches Previous Page  | Next Page
Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Beyond Shadow IT: A Proactive Approach to Reducing Risk While Embracing Cloud Services
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper will teach you how to address shadow IT to ensure a stable, secure cloud environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

SkyHigh

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 19 Aug 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Boost IT Visibility & Value with Service Catalog
sponsored by ServiceNow
WHITE PAPER: Find out how creating a great service catalog can help prove the value of IT, and why many consider it fundamental.
Posted: 19 May 2014 | Published: 30 Apr 2013

ServiceNow

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Build a Network that Meets the Enterprise Standard of Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Beyond Job Scheduling:The Road To Enterprise Process Automation
sponsored by UC4 Software, Inc
WHITE PAPER: This white paper demonstrates the ever-increasing value of enterprise process automation and outlines a set of requirements for truly achieving it.
Posted: 11 Aug 2011 | Published: 31 Dec 2010

UC4 Software, Inc

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

BI for Small and Mid-sized Businesses
sponsored by LogiXML
WHITE PAPER: This paper dispels some myths about BI in smaller companies and outlines the main options at your disposal.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

LogiXML

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.
151 - 175 of 1191 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement