IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Multimedia (View All Report Types)
1 - 25 of 86 Matches Previous Page  |  Next Page
2019 LexisNexis True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
WEBCAST: A recent study by LexisNexis Risk Solutions was conducted to help safely navigate the increasing risk of fraud. The research was able to provide a snapshot of current fraud trends and key pain points among financial services and lending companies in the US. Continue to this webcast to uncover the insights from the research.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

LexisNexis® Risk Solutions

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

Channel Security Experts Deep Dive: The Anatomy of an MSP Breach
sponsored by Datto, Inc.
WEBCAST: In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.
Posted: 16 Oct 2019 | Premiered: Oct 16, 2019

Datto, Inc.

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

A Brazilian company adopts IBM System z to handle rapid business growth
sponsored by IBM
WEBCAST: This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
Posted: 21 Feb 2014 | Premiered: May 29, 2013

IBM

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

CA ARCserve Backup r12.5 SRM Features
sponsored by arcserve
VIDEO: CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

DellEMC and Intel®

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Dynamic Case Management: A Foundation for Agile Enterprise Business Applications
sponsored by Pegasystems
VIDEO: The dynamic case management approach is helping companies achieve significant, competitive results.  In this webinar, learn how your company can also achieve better service outcomes with dynamic case management.
Posted: 05 May 2011 | Premiered: 02 May 2011

Pegasystems

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Enhancing Server and Cloud Security with Intel® Trusted Execution Technology (Intel® TXT)
sponsored by Dell, Inc. and Intel®
VIDEO: This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments.
Posted: 07 Apr 2011 | Premiered: 14 Dec 2010

Dell, Inc. and Intel®

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise
1 - 25 of 86 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement