IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
226 - 250 of 1593 Matches Previous Page  |  Next Page
Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

BIMODAL IT: The Path to Agility
sponsored by Red Hat
RESOURCE: In the following informative infographic, learn how a bimodal approach to IT can enable far greater IT agility at a manageable cost.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Red Hat

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Building A Resilient Smart Grid
sponsored by Red Hat
WHITE PAPER: Download this resource to discover reference architectures to improve collection, distribution and storage of data within energy providers' IT infrastructures. Additionally, learn how providers can embrace digital transformation to improve electric utilities services.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Red Hat

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Building Better Business Analytics to Improve BI
sponsored by Pyramid Analytics
RESOURCE: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Learn about a business intelligence platform that empowers users outside of IT to dive into data with the security of a governed analytics environment.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Pyramid Analytics

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

Building Trust in a Cloudy Sky
sponsored by McAfee, Inc.
RESEARCH CONTENT: 90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."
Posted: 10 Feb 2017 | Published: 31 Jan 2017

McAfee, Inc.

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

Boost IT Visibility & Value with Service Catalog
sponsored by ServiceNow
WHITE PAPER: Find out how creating a great service catalog can help prove the value of IT, and why many consider it fundamental.
Posted: 19 May 2014 | Published: 30 Apr 2013

ServiceNow

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Build a Cohesive, Effective Security Strategy
sponsored by Splunk
EGUIDE: Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
Posted: 08 Aug 2016 | Published: 31 Jul 2016

Splunk

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Building a Redundancy Strategy and Streamlining Multi-Cloud Management with Infrastructure as Code
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover 3 key steps for formulating a multi-cloud redundancy strategy using multiple providers. Additionally, you'll learn how to overcome the challenges infrastructure as code poses to hybrid cloud management, including addressing disparate cloud hosting environments and DevOps' role in implementation.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Hewlett Packard Enterprise

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Building Capabilities Leveraging Alternate Solution Deployments
sponsored by SAP America, Inc.
WHITE PAPER: This white paper explores the delivery methods and strategies for achieving versatile, agile and powerful IT capabilities. Inside, learn about the need for service and application orchestration, as well as cutting edge strategies for meeting a new generation of business needs.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SAP America, Inc.
226 - 250 of 1593 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement