IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Multimedia (View All Report Types)
76 - 100 of 166 Matches Previous Page  |  Next Page
Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

IdentityNow Short Video: Separation of Duties
sponsored by SailPoint Technologies
VIDEO: Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

SailPoint Technologies

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security

Incident Management Tour
sponsored by Atlassian
VIDEO: Incident management platforms speed up IT processes, escalating problems to the right person and shortening response times. This quick two minute video covers one company's ITSM platform, and takes you on a tour through the program.
Posted: 23 Nov 2020 | Premiered: 09 Nov 2020

Atlassian

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Introduction to DNSDB Part 2: Walk
sponsored by Farsight Security
WEBCAST: Many people on the internet behave in a way that can be considered ‘unaccountable.’ Some may even use a proxy to hide their true identity. Find out how to see through the smokescreen and pin down the truly bad domains in this DNSDB webinar.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

Farsight Security

Introduction to Perspectium
sponsored by ServiceNow
WEBCAST: This video highlights the two major problems Perspectium can solve for ServiceNow customers: automating data extraction at volume and velocity, for archive, backup/restore, reporting and analytics, migrations, and more and providing a platform for service providers to connect with their customers throughout the service relationship.
Posted: 06 Nov 2020 | Premiered: Nov 6, 2020

ServiceNow

Leverage the power of Rapid7 and AWS integrated threat protection and response solution
sponsored by AWS Rapid7
VIDEO: Cloud environments are growing at such a rapid pace that traditional SIEM tools often lack the visibility to identify and mitigate threats – leading to an overworked security staff. This webinar discusses how the integration of Rapid7 InsightIDR and Amazon GuardDuty can improve visibility (and morale) for organizations with AWS environments.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

AWS Rapid7

Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

Mitigating Application DDoS Attacks
sponsored by F5 Networks
WEBCAST: Your network, DNS & TLS are not often thought of as being part of applications. Yet DoS or DDoS attacks against these tiers can render your networks, apps or other supporting infrastructure inaccessible. The challenge is identifying & blocking attackers’ requests whilst still allowing clean traffic. View this webinar to learn how to do this.
Posted: 08 Sep 2020 | Premiered: Sep 8, 2020

F5 Networks

MITRE ATT&CK: Security Evaluation Overview
sponsored by BlackBerry
VIDEO: MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

BlackBerry

MITRE ATT&CK: The Power of Prevention
sponsored by BlackBerry
VIDEO: In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

Multicloud Security Services
sponsored by Rackspace
VIDEO: As cloud migration continues to grow in popularity, organizations are beginning to realize that traditional cybersecurity approaches are ill-fitted to address the security needs of cloud environments. Watch this webinar to discover how Rackspace and Google Cloud are working together to address these threats.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020

Rackspace

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date
sponsored by Webroot
WEBCAST: Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
Posted: 30 Aug 2012 | Premiered: Sep 6, 2012

Webroot

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel
76 - 100 of 166 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info