IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automated Data Capture

RSS Feed   
Automated Data Capture Multimedia (View All Report Types)
 
Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Online Trial: Rational System Architect
sponsored by IBM
SOFTWARE DOWNLOAD: Try IBM® Rational® System Architect® V11.3, which enables business managers and IT professionals to plan, model, and execute changes to improve their business strategy and process as well as the IT systems and infrastructure that support them, enabling successful enterprise planning and transformation.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement