IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
151 - 175 of 1533 Matches Previous Page  |  Next Page
Ansible In Depth: A Playbook for Complex IT Orchestration
sponsored by Red Hat
WHITE PAPER: Discover in this white paper an in-depth overview of IT configuration management, deployment, and orchestration tool Ansible, accessible for all skill levels and purpose-built for easily deploying workloads to public and on premise clouds.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Red Hat

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

Ansible Tower in the Software Development Lifecycle
sponsored by Red Hat
WHITE PAPER: Discover the benefits Ansible Tower offers in the software development lifecycle (SDLC), and take advantage of its flexibility to embed it in existing tools and processes. Read on to centralize your infrastructure and SDLC management with a platform that will enable self-service and improve automated testing.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Red Hat

Anti-Money Laundering: Combatting Rising Threats and Meeting Regulations
sponsored by BAE Systems
RESEARCH CONTENT: With the cost of non-compliance continuing to rise, learn how banking and financial institutions are bolstering their anti-money laundering (AML) systems. Plus, discover how to derive further value from AML platforms by leveraging their ability to provide a multi-sourced, dynamic, and up-to-date view of customer account data to create key insights.
Posted: 01 Mar 2017 | Published: 29 Feb 2016

BAE Systems

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Application Security Testing Vendors: Analyzed and Graded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this Gartner research report learn the importance of various vendors in the application security testing field, how this impacts the greater application security landscape, and more.
Posted: 16 Mar 2017 | Published: 28 Feb 2017

Hewlett Packard Enterprise

Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER: The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Palo Alto Networks

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Are you securing the right things? How to effectively secure your data
sponsored by ComputerWeekly.com
WHITE PAPER: The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.
Posted: 21 Oct 2011 | Published: 13 Oct 2010

ComputerWeekly.com

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

Assessing the Economics of Red Hat Virtualization
sponsored by Red Hat
ANALYST REPORT: Download this report to access a framework for evaluating the economic impact of Red Hat Virtualization, as well as potential ROI and enhanced user productivity realized through its deployment. Take advantage of this Kernel-based Virtual Machine (KVM) hypervisor to accomplish your virtualization initiatives.
Posted: 22 Feb 2017 | Published: 30 Nov 2016

Red Hat

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Aozora Bank Enhances Visibility and Efficiency with Centralized Single Point of Contact Monitoring Tool
sponsored by CA Technologies
CASE STUDY: This case study examines the centralized tool Aozora Bank leveraged to increase the scalability, flexibility, and agility of their complex IT infrastructure. Learn how they improved their ability to monitor their complex system landscape from a single point of contact.
Posted: 22 Sep 2016 | Published: 28 Feb 2015

CA Technologies

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

MuleSoft

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

ArcSight Case Study: Experian
sponsored by ArcSight, an HP Company
CASE STUDY: Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.
Posted: 11 May 2010 | Published: 11 May 2010

ArcSight, an HP Company

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout

Are You Ready For a New Era in B2B Collaboration?
sponsored by IBM
WHITE PAPER: This white paper examines what companies can do to modernize their approach to business-to-business collaboration in response to trends like globalization, consumerization, and mobility.
Posted: 03 Sep 2014 | Published: 31 Mar 2014

IBM

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM
151 - 175 of 1533 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement