IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan White Papers (View All Report Types)
1 - 25 of 503 Matches Previous Page  |  Next Page
3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

5 Reasons for Hitachi Ops Center Automator
sponsored by Hitachi Vantara Corporation
WHITE PAPER: Download this guide to learn five of the reasons why your organization should introduce IT automation into your existing processes – and why IT automation can prove invaluable to your staff.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Hitachi Vantara Corporation

5 Reasons to Make Virtual Support Agent Adoption a Priority
sponsored by Serviceaide
WHITE PAPER: Inside, find a list of five reasons to consider a virtual support agent, including improved service user experiences, increased automation opportunities, and more.
Posted: 03 May 2019 | Published: 03 May 2019

Serviceaide

5 Stages of Incident Management and How to Improve Them
sponsored by Atlassian
WHITE PAPER: Download this guide to learn about the five core stages of the modern incident management process – and why understanding the ins-and-outs of each stage is so important in today's world.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Atlassian

5 Steps to Transform Your IT Organization with Artificial Intelligence
sponsored by Splunk
WHITE PAPER: Jump into this guide to learn the five steps it takes to get started on a big data and machine learning infused IT operations strategy – without getting bogged down by too many tools and competing IT priorities.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

Splunk

5 Ways to Eliminate Help Desk Fire Drills
sponsored by ServiceNow
WHITE PAPER: Without an efficient way to manage requests, data, and staff, your help desk is in trouble – especially in today's increasingly complex IT environments. Learn about 5 best practices that will get your help desk up to speed, and keep it there.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ServiceNow

5G, AI, Deepfakes and Beyond: The Future of IT and Security
sponsored by Splunk
WHITE PAPER: The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

6 Steps to Successful Capacity Management
sponsored by BMC
WHITE PAPER: Inside this 12-page guide, uncover 6 IT infrastructure best practices that can help you smooth out capacity inconsistencies across your entire stack – including on-prem and cloud.
Posted: 17 May 2019 | Published: 17 May 2019

BMC

A Day in the Life of an IT Remote Support Agent
sponsored by LogMeIn RescueAssist
WHITE PAPER: Remote support agents can’t help but take their work home with them – it’s in the job description. Click inside to step through the day-to-day life of a remote support agent as they provide critical IT support from work, home, and even the local coffee shop.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

TOPICS:  IT Systems
LogMeIn RescueAssist

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide To Fraud In The Real World
sponsored by Splunk
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

8 Essentials of Business Analytics
sponsored by SAS
WHITE PAPER: Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SAS

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge
1 - 25 of 503 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement