IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Multimedia (View All Report Types)
26 - 50 of 179 Matches Previous Page  |  Next Page
Customer Series: How to go from IoT Concept to Market Rapidly with Dynamis
sponsored by Particle
WEBCAST: This webcast provides advice to help launch your idea into production using IoT. Learn common go-to-market challenges and how you can overcome them by partnering with Particle. Download the webcast now.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

Particle

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020

Barracuda

Dissecting a Chinese APT Targeting Southeast Asian Government Institutions
sponsored by Bitdefender
VIDEO: Advanced persistent threats (APTs) typically follow a similar framework and timeline – with slight variations depending on the target and scope of the attack. This webinar dissects the infamous Chinese APTs targeting southeast Asian governments – focusing on the timeline, tactics and early warning signs of an APT.
Posted: 25 Nov 2020 | Premiered: 25 Nov 2020

Bitdefender

Diving into WAF and on Ways to Prevent DDoS
sponsored by Rackspace
PODCAST: In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.
Posted: 02 Apr 2020 | Premiered: Mar 29, 2019

Rackspace

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

Endpoint Detection and Response
sponsored by Claranet
VIDEO: In this 6-minute webinar, tune into a discussion about the evolution of endpoint detection and response (EDR) – from niche monitoring tool to a staple for overworked IT and security teams.
Posted: 21 Aug 2020 | Premiered: 21 Aug 2020

Claranet

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Expert Advice to Enable Remote IT Access
sponsored by Vertiv
VIDEO: In this webinar, Vertiv experts will discuss how to prepare for business continuity when physical access to critical resources is restricted and how to allow access to IT infrastructure from anywhere at any time.
Posted: 29 Sep 2020 | Premiered: 29 Sep 2020

Vertiv

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
VIDEO: Given the implications of a successful cyberattack, the need for effective threat detection and response has never been more urgent. In this short webinar, the Chief Technical Officer at Cysiv provides an overview of how threat detection and SIEM objectives can benefit from the use of data science. Watch now to learn more.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Cysiv

Finding Peace of Mind in Your Security Strategy
sponsored by Rackspace
WEBCAST: As successful breaches continue to plague organizations, it’s more important than ever to evaluate common risk areas and address them accordingly. In this webcast, join the SVP of Security at Alert Logic as he highlights key areas of vulnerabilities and how threats are evolving with organizational infrastructure.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Rackspace

Flyform: What Is a CMDB & How to Make It Work for You
sponsored by ServiceNow
WEBCAST: Watch FlyForm CEO Phil Davies and Senior Technical Consultant Steven Williams break down the nuances of a CMDB and how implementing and nurturing a CMDB is crucial to optimising an organisation's operations.
Posted: 06 Nov 2020 | Premiered: Nov 6, 2020

ServiceNow

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

DellEMC and Intel®

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Dynamic Case Management: A Foundation for Agile Enterprise Business Applications
sponsored by Pegasystems
VIDEO: The dynamic case management approach is helping companies achieve significant, competitive results.  In this webinar, learn how your company can also achieve better service outcomes with dynamic case management.
Posted: 05 May 2011 | Premiered: 02 May 2011

Pegasystems

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Enhancing Server and Cloud Security with Intel® Trusted Execution Technology (Intel® TXT)
sponsored by Dell, Inc. and Intel®
VIDEO: This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments.
Posted: 07 Apr 2011 | Premiered: 14 Dec 2010

Dell, Inc. and Intel®

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

Expect More From Your SIEM
sponsored by AT&T Cybersecurity
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity
26 - 50 of 179 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info