Hardware  >   Security Hardware  >   Network Security Hardware  >  

Biometric Devices

RSS Feed   
DEFINITION: Devices that provide biological identification of a person, which includes eyes, voice, handprints, fingerprints and hand-written signatures.
Biometric Devices White Papers (View All Report Types)
1 - 25 of 162 Matches Previous Page  |  Next Page
2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

5 Ways to Maximize the Security, Performance and Reliability of Your Online Business
sponsored by Cloudflare
WHITE PAPER: Creating a superior online experience requires the right security and performance strategy. In this white paper, explore 5 key considerations that can help businesses meet customer needs and provide a secure and seamless user experience.
Posted: 06 May 2020 | Published: 06 May 2020

Cloudflare

7 ways to work from anywhere
sponsored by Cloudflare
WHITE PAPER: Today, workforces are drastically more mobile and distributed. Where it was once feasible to draw a perimeter around corporate resources, the rise of SaaS, cloud computing, and remote work has rendered this approach obsolete. In this e-book, learn 7 best practices that can help you protect your global workforce without sacrificing productivity.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cloudflare

A Massively Scalable Approach to Network Security
sponsored by SonicWall
WHITE PAPER: Learn about a new approach securing your network in this white paper. It explores a network-based model for scaling a next-generation firewall (NGFW) that can help provide better performance, increase resiliency and lower TCO.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

SonicWall

A Network for Blazing Fast and Secure Content Experiences
sponsored by Cloudflare
WHITE PAPER: As user expectations for speed, stream quality, and image quality grow, performance becomes more crucial for growing media and entertainment companies. At the same time, companies must keep their data secure. Download this white paper to learn how you can improve your security posture while boosting performance.
Posted: 04 May 2020 | Published: 04 May 2020

Cloudflare

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Cenitex Hybrid IT Services Case Study
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Delivering government services that are relevant, responsive, and secure is challenging, even on a good day.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

TOPICS:  Hardware
Hewlett Packard Enterprise

3D printing: bringing better products to market faster
sponsored by Stratasys, Ltd
WHITE PAPER: Discover how 3D printing can help your organization bring better products to market faster.
Posted: 28 Apr 2014 | Published: 28 Feb 2014

Stratasys, Ltd

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

A Bathwick Group white paper: A foundation for database simplification, consolidation and cost reduction
sponsored by IBM
WHITE PAPER: This white paper challenges several assumptions about scale-out architectures and explains how consolidation and virtualisation can help you regain control over your infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

IBM

A reference architecture for a leading solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper explores the reference architecture for a leading server solution. Learn how this architecture is designed to influence the benefits of virtualizing the underlying infrastructure and address the common problems associated with hardware sprawl.
Posted: 21 Oct 2014 | Published: 30 Sep 2014

DellEMC and Intel®

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 25 Apr 2011 | Published: 30 Nov 2010

Oracle Corporation

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 12 Mar 2012 | Published: 30 Sep 2010

Oracle Corporation

Best Practices for successful IP Address Management (IPAM)
sponsored by Infoblox
WHITE PAPER: This white paper discusses several ways to develop a successful IPAM strategy.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Infoblox

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Bringing Order to IT Chaos in Remote Offices
sponsored by DELL & INTEL
WHITE PAPER: Take a look at this exclusive resource to find out how this converged infrastructure hardware can help you enable business success.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

DELL & INTEL

Can Your Data Center Infrastructure Handle the Heat of High Density
sponsored by CyrusOne
WHITE PAPER: High density computing is today's standard in best-in-class performance and availability, and those that fail to keep pace or fall behind will find themselves no longer competitive in today's markets.
Posted: 11 Aug 2008 | Published: 01 Aug 2008

CyrusOne

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.
1 - 25 of 162 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences