Voice Biometrics White Papers

(View All Report Types)
Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER: This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014

Infoblox

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix