IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
201 - 225 of 1186 Matches Previous Page  |  Next Page
Case Study: State Agency Bolsters Security & Operational Efficiencies
sponsored by Splunk
WHITE PAPER: This case study describes how the Nevada Department of Transportation enhanced its security and its efficiency with better log management.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

Casting A Light on Shadow IT
sponsored by VMware
RESOURCE: Learn everything you need to know about shadow IT in this informative info graphic. Shed light on common motivations for practicing shadow IT and learn how you can better manage this phenomenon within your organization.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

VMware

CIOinsight: Managing IT Complexity in the Enterprise (Full Report)
sponsored by SAP America, Inc.
WHITE PAPER: The following white paper examines the many causes and effects of IT complexity and offers insight for CIOs on how to properly address this dilemma. Access now and learn how to alleviate the stress of IT complexity now and for initiatives down the road.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

SAP America, Inc.

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
WHITE PAPER: In this comprehensive e-guide, experts Mike Chapple and Kevin Tolly explain the need for cloud security services. Uncover their take on five different cloud endpoint security services on the market today.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

Symantec Corporation

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Cloud Security as a Service For Secure Cloud-Based Server Hosting
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011

SearchSecurity.com

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

Case Study: Rochford District Council Secures 25 Years' of History with Acronis
sponsored by Acronis NEMEA
CASE STUDY: Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more.
Posted: 31 May 2011 | Published: 31 May 2011

Acronis NEMEA

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011

FireEye

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation

Cloud rEvolution: A Workbook for Cloud Computing in the Enterprise
sponsored by CSC
WHITE PAPER: This white paper will get you up to speed on all aspects of cloud computing. It will help you examine cloud opportunities, review potential issues, and consider where and how specific information should be processed in your organization. Check out this white paper to learn more.
Posted: 17 Nov 2010 | Published: 17 Nov 2011

CSC
201 - 225 of 1186 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement