IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Biometric Signatures

RSS Feed   
ALSO CALLED: Signatures
DEFINITION: The characteristics of a person's hand-written signature done on a digital-based pen tablet and recorded as an algorithm that is compared against future signatures.
Biometric Signatures Reports
176 - 200 of 6459 Matches Previous Page  |  Next Page
5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

5 Steps to Mitigate the Risks of Privileged Accounts
sponsored by One Identity
WHITE PAPER: Granting privileged access increases the risk of a security breach, no matter what industry your organization represents. This resource provides strategies for preventing security breaches and offers 5 steps to mitigate the risks of privileged accounts
Posted: 09 Feb 2018 | Published: 09 Feb 2018

One Identity

5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

5 Ways that IT Systems Management can accelerate business growth
sponsored by Dell EMC
WHITE PAPER: Learn 5 ways to establish efficiencies and effective IT operations so you can focus your time on business innovations.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

TOPICS:  IT Management
Dell EMC

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

5 Ways to Eliminate Help Desk Fire Drills
sponsored by ServiceNow
WHITE PAPER: Without an efficient way to manage requests, data, and staff, your help desk is in trouble. If your help desk is struggling to keep pace with business, there's good news. Modern IT service management can transform the way your help desk works. Learn about 5 best practices that will help get you to modern IT Service Management.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

ServiceNow

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.

5 steps to aligning IT to the needs of your organization
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: Read this white paper to uncover the five steps you can take to align your IT to the needs of your organization. Inside, uncover how to develop a vision, leverage cloud to facilitate alignment, and much more.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Strategies to Transform Sales and Marketing Processes
sponsored by K2
WHITE PAPER: Increase revenue and improve customer self-service by transforming the top 5 sales and marketing processes.
Posted: 19 May 2016 | Published: 19 May 2016

TOPICS:  IT Management
K2

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

5 tips to ensure that big data has a big impact on your organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn five tips to get more actionable insight from your data and find out how you can ensure that big data has a big impact on your business.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Cisco Systems, Inc.

5 Tips to Improve Sales Performance
sponsored by Oracle Corporation
WHITE PAPER: From strategies to analysis, learn what top companies are doing in this modern best practices guide.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

5 Traits of an Intelligence-Driven Security Operation Center
sponsored by Intel Security
WEBCAST: Understand the key challenges of traditional SOCs and find out what security leaders must do to build or mature an SOC.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

5 Virtues of Virtualization in Healthcare IT
sponsored by Commvault
WHITE PAPER: Access this white paper to see the 5 virtues of virtualization in healthcare IT, and what you can do to stay ahead of the curve.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Commvault

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

5 Ways Integrated Infrastructure is at the Center of Fast IT
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: In the following white paper, uncover the top five characteristics a data center must have in order to capitalize on the new technology coming into the market. Access now and learn about the importance of integrated infrastructure management, convergence, and more.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

5 Ways to Create a Successful Innovation Program
sponsored by Spigit
WHITE PAPER: What exactly does it take to create sustainable innovation program, driving impactful results to both the business side and IT? Learn how to implement a successful crowdsourced innovation program with the 5 methods outlined in this white paper.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Spigit

5 ways to get more from your cloud
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: The following white paper offers readers insight into five ways to get more from your cloud.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

5 Ways Veritas Makes VMware vSphere Backup Rock!
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas
176 - 200 of 6459 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement