IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
51 - 75 of 1113 Matches Previous Page  |  Next Page
A Practical Plan for a Successful Sun Migration
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how you can migrate from Sun IdM to SailPoint IdentityIQ with an approach that leverages your existing investments and expertise, lowers the total cost of migration, and enables you to improve your identity management services to include identity governance and compliance.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

SailPoint Technologies

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: Short Description: Download this exclusive white paper now to learn more about the threats organizations are facing today, the means to combat those threats, and the next-generation of cloud-driven protection.
Posted: 29 Jan 2015 | Published: 18 Nov 2014

Webroot

Accurate, Effective Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper describes an example of an airtight fraud prevention system.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Achieving Optimal Security for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 27 Mar 2014 | Published: 31 Mar 2013

IBM

Adapting to New Data Channels and Improving Performance with Converged Infrastructure
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 05 Dec 2014 | Premiered: Oct 22, 2014

Hewlett-Packard Company

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett-Packard Company

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Limited

Accelerating Unified Communications With an Enterprisewide Architecture
sponsored by Avaya
WHITE PAPER: To support today’s business challenges, enterprises require a new architecture for communications that is standard, loosely coupled, three-tier and centralized.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Avaya

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Access Accounts More Securely with Intel® Identity Protection Technology
sponsored by Intel
PRODUCT OVERVIEW: This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them.
Posted: 03 Aug 2011 | Published: 02 Aug 2011

Intel

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

Actuate Performancesoft Suite Product Tour
sponsored by Actuate
SOFTWARE DEMO: An effective method of monitoring and managing metrics is critical to increasing the performance of any organization. Learn how to gain visibility into all areas of concern and leverage insight into operations that stakeholders demand to ensure success.
Posted: 17 May 2007 | Premiered: 17 May 2007

Actuate

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Admiral Group ensures superb performance and scalability
sponsored by IBM
WHITE PAPER: Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.
Posted: 06 Jun 2012 | Published: 30 Jun 2011

IBM
51 - 75 of 1113 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement