IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
151 - 175 of 1163 Matches Previous Page  |  Next Page
Bolstering Network Security in a BYOD World
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses how you can stop the threats introduced by BYOD trends by implementing comprehensively visibility into all network traffic.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

Boost HR Systems to the Next Level
sponsored by SAP
EGUIDE: In this expert e-guide, hear from Emma Snider who shares tips on how to choose your next HR IT system. Also, Beth Stackpole discusses the growing popularity of talent analytics as a means of improving HR decision-making.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: In this paper, SANS discusses how the layered model is more relevant than ever and how a layered approach to security provides better protection of your organization's IT assets.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Breakthrough efficiency gains through systems management innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how a server portfolio with embedded management capabilities can enable you to manage infrastructure hardware from mobile devices, as well as implement automated, policy-based operations.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

Dell, Inc. and Intel®

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013


Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

Building a Security Incident Response Plan That Works
sponsored by IBM
WHITE PAPER: This white paper can help you avoid ten of the most common mistakes organizations make during a security incident.
Posted: 08 Sep 2015 | Published: 31 Jan 2014


Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009


Boost IT Visibility & Value with Service Catalog
sponsored by ServiceNow
WHITE PAPER: Find out how creating a great service catalog can help prove the value of IT, and why many consider it fundamental.
Posted: 19 May 2014 | Published: 30 Apr 2013


Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012


Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Building an Extranet Portal
sponsored by Juniper Networks, Inc.
WHITE PAPER: The need for organizations to provide network access for external audiences such as partners & customers is increasing. This paper details the benefits of an extranet portal & highlights SSL VPN technology as a best approach to achieve increase...
Posted: 27 Oct 2006 | Published: 01 Sep 2006

Juniper Networks, Inc.

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.

Business Intelligence in SAP Environments
sponsored by IBM
WHITE PAPER: This paper discusses the disruptions to SAP’s roadmap after the acquisition of BOBJ, and discusses various scenarios in which customers might decide to stay with SAP BOBJ for its BI strategy, and also when it might be best to use a third-party BI platform to leverage their SAP investments. Read this paper to learn more.
Posted: 22 Jun 2010 | Published: 26 May 2010


Business Intelligence on a Budget: Is Software as a Service Business Intelligence right for your organization?
sponsored by Indicee
WHITE PAPER: With no upfront cost and minimal effort required for set up, SaaS BI solutions are ideal for small to mid-sized businesses, for addressing specific business needs or when few IT resources are available. SaaS BI solutions quickly provide access to critical reporting and analysis without the time needed for a full-blown on-premise BI implementation.
Posted: 05 Apr 2010 | Published: 05 Apr 2010


Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Business Rules and Gap Analysis: Discovery and Management of Business Rules Avoids Business Disruptions
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper will assess how to locate and account for functionality gaps. It will also illustrate a methodology for realigning applications with business goals.
Posted: 04 Dec 2009 | Published: 23 Nov 2009

Micro Focus, Ltd

Business Strategy for Cloud Providers: The Case for Potential Cloud Services Providers
sponsored by IBM
WHITE PAPER: This paper is focused on helping those who want to emerge aswinners in the new cloud provider marketplace. Read on to learn tips for creating a winning cloud provider business strategy and model.
Posted: 21 Sep 2010 | Published: 29 Sep 2009

151 - 175 of 1163 Matches Previous Page    5 6 7 8 9 10    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement