IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
76 - 100 of 1141 Matches Previous Page  |  Next Page
Advancements in Colocation: The Challenges to Modern Businesses and Buying Criteria
sponsored by PEER 1
WHITE PAPER: In this white paper, delve into the modern business benefits of colocation, and identify how your enterprise can leverage new advancements in data center colocation to ease your systems operations. Read on access a 12-point checklist to assist you in building a better business case for colocation.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

PEER 1

Advancing Cyber-Security Measures Inside
sponsored by VMware
RESOURCE: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

AIIM Report: Paper-Free Progress and Measuring Outcomes
sponsored by EMC
ANALYST REPORT: This exclusive report takes an in-depth look at the challenges of digitizing paper processes, digital mailrooms and multi-channel capture, and learn how to go paper-free and transform your business processes with mobile and cloud.
Posted: 05 Apr 2016 | Published: 31 Dec 2015

EMC

Aligning Enterprise Identity and Access Management with CIO Priorities
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

SearchSecurity.com

An Innovation Model for Technology and Business Planning
sponsored by Hewlett-Packard Enterprise
VIDEO: Should you push hard to be at the leading edge, or play it safe and risk being overly cautious? Tune in to learn how to navigate your financial business through rough waters and see which technologies are now most adopted by today's financial institutions.
Posted: 18 Mar 2016 | Premiered: 11 Nov 2015

Hewlett-Packard Enterprise

Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits
sponsored by ComputerWeekly.com
WHITE PAPER: Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

Anomaly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WHITE PAPER: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Published: 24 Jan 2015

Prelert

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Advantage of the CMOS Sensor: Latest image sensor technology for HD security
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This white paper features an improved video structure for security system cameras that provides high-definition (HD) picture quality and high-sensitivity sensors to ensure the top monitoring capabilities.
Posted: 03 Oct 2013 | Published: 31 Dec 2011

Sony Electronics Asia Pacific Pte Ltd

After the crisis: What now?
sponsored by IBM
WHITE PAPER: To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.
Posted: 26 Aug 2010 | Published: 09 Mar 2010

IBM

Agile IT Helps Customers Choose Aviva Health
sponsored by IBM
CASE STUDY: Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

An Expert Guide to Accelerating Deduplication
sponsored by Fujitsu
EGUIDE: This expert guide discusses the recent movement to accelerate deduplication and takes a hard look at how this technology compares to other disk-based backup solutions.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Fujitsu

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Analytics Solutions for LinuxONE: An Overview
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how LinuxONE extracts insights and scales effortlessly to meet your big data and analytics demands. Read on to learn how it can provide your enterprise with high performing business intelligence (BI) and cost effectively meet your availability expectations with IT operations analytics.
Posted: 25 Feb 2016 | Published: 31 Aug 2015

IBM

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot
76 - 100 of 1141 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement