IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal ScanReports
176 - 200 of 949 Matches Previous Page  | Next Page
Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

Combating Cybercrime - A Collective Global Response
sponsored by ThreatMetrix
WHITE PAPER: This guide explores the current threat landscape and how businesses are combating cybercrime on a global level.
Posted: 20 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: The results of not meeting the necessary requirements are nothing but negative, including huge fines and a bad reputation. Fortunately this white paper offers a seven step guide to achieve a successful compliance management system.
Posted: 03 Dec 2013 | Published: 31 Jul 2013

Infoblox

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage

Conquering the sys-admin challenge
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from Quocirca presents new data on how well organisations are able to automate their sys-admin procedures, manage the use of privilege and satisfy the requirements of auditors.
Posted: 29 Oct 2012 | Published: 29 Oct 2012

ComputerWeekly.com

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Cost-effective, Compliance-ready Open-source Identity Management
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a scalable, cost-effective identity management solution that improves risk management, end-user efficiency, and facilitates regulatory compliance.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

OpenIAM

Cloud-Based ERP Adoption and Integration Challenges
sponsored by Kenandy
EGUIDE: This expert e-guide from SearchManufacturingERP.com explores key challenges of ERP integration and explains why more and more organizations are eyeing the cloud-based ERP option.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Kenandy

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

Comparing Data Center Batteries, Flywheels, and Ultracapacitors
sponsored by APC by Schneider Electric
WHITE PAPER: This paper explores several popular classes of batteries, compares batteries to both flywheels and ultracapacitors, and briefly discusses fuel cells.
Posted: 10 Jul 2008 | Published: 01 Jul 2008

APC by Schneider Electric

Comparing Servers for Oracle Database 11g Upgrades
sponsored by HP & Intel®
EBOOK: In this e-book, readers can View a technical comparison of four servers capable of running Oracle 11g and determine Which edition of Oracle 11g best fits their needs. Additionally, expert advice is given on in-place upgrade vs. a migration upgrade.
Posted: 21 May 2010 | Published: 21 May 2010

HP & Intel®

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication
sponsored by SafeNet, Inc.
WHITE PAPER: Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices.
Posted: 02 Nov 2009 | Published: 01 Sep 2009

SafeNet, Inc.

Confronting the Data Center Crisis: A Cost-- Benefit Analysis of the IBM Computing on Demand (CoD) Cloud Offering
sponsored by IBM
WHITE PAPER: Through IBM client interviews across several industries and other industry and workload analyses, this paper examines the benefits and costs of IBM's CoD offering for high performance business and technical computing.
Posted: 07 Dec 2009 | Published: 09 Mar 2009

IBM

Contact Center Security: Moving to the True Cloud
sponsored by LiveOps
WHITE PAPER: Today, Cloud is one of the most talked about trends in the IT industry. It’s a paradigm many believe will have a widespread business impact. However, while the term “Cloud”is relatively new, one of the core components, distributed computing, is well-established.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

LiveOps

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security

Cool IT Equipment Efficiently to Lower Energy Use and Cut Costs
sponsored by Upsite Technologies, Inc.
WHITE PAPER: To optimize your data center infrastructure, consider these four practical best practice steps that Upsite's engineers have devised for solving cooling inefficiencies through proper airflow management.
Posted: 14 Oct 2008 | Published: 09 Oct 2008

Upsite Technologies, Inc.

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.
176 - 200 of 949 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement