IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
26 - 50 of 1541 Matches Previous Page  |  Next Page
4 Steps to Bolstering Public Cloud Security
sponsored by evident.io
RESOURCE: Discover a modern, cloud-native security approach that will bolster your public cloud's security with automation, real-time discovery, deep insights and robust reporting.
Posted: 24 May 2017 | Published: 24 May 2017

evident.io

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

5 Ways IT Pros Automate Business
sponsored by Solarwinds MSP
WHITE PAPER: While the needs of every organization are obviously different, this white paper outlines 5 things that the most successful IT pros are doing to automate their department today.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Solarwinds MSP

5 Ways to Cut Spending on Microsoft Software
sponsored by Snow Software
RESOURCE: Enact five cost-saving initiatives for Microsoft products using the Software Asset Management (SAM) processes and technologies outlined in this guide. Download now to avoid the pitfalls of overspending with a software license manager that automates the removal of unused applications, and more.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Snow Software

5 Ways to Cut Spending on SAP Software
sponsored by Snow Software
RESOURCE: Discover how to reduce SAP licensing costs with holistic Software Asset Management. Download this resource to examine five key initiatives to drive significant SAP savings—and avoid the pitfalls of overspending.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Snow Software

5 Ways to Save on IBM Licensing
sponsored by Snow Software
WHITE PAPER: This white paper explores how to put an effective software asset management strategy in place that's tailored to the complexities of IBM-specific processes and products. Access now to discover how you can increase the efficiency of entitlement management, licensing, and more.
Posted: 10 Oct 2016 | Published: 16 Mar 2016

Snow Software

5th edition of the latest trends and insights for CIOs, CTOs and CDOs.
sponsored by ComputerWeekly.com
EGUIDE: Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

ComputerWeekly.com

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

7 Ways to Simplify Security Intelligence so Your Team Can Work Smarter, Not Harder
sponsored by LogRhythm, Inc.
WHITE PAPER: With automated response, your analysts can review the situation before countermeasures are executed, while at the same time greatly reducing mean time to respond. In this resource, you'll uncover 7 best practices for getting security intelligence technology to work harder, so people can work smarter.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

LogRhythm, Inc.

451 Group Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This report analyzes where AlienVault fits into the SMB security market. Read on for descriptions of products that AlienVault offers and considerations surrounding the main strengths, weaknesses, opportunities and threats facing the organization in relation to its competitors.
Posted: 05 May 2014 | Published: 26 Mar 2014

AlienVault

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

5 Steps to Building a Private Cloud Environment in Your Enterprise
sponsored by Dell EMC and Microsoft
EGUIDE: Building a private cloud isn't a quick process. In this expert e-guide, discover the first 5 steps you need to take to conceive, build, and maintain a private cloud within your enterprise. Read now to get started, and access these key first steps for your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Dell EMC and Microsoft

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data
26 - 50 of 1541 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement