IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Biometrics

RSS Feed   
ALSO CALLED: Biometry
DEFINITION: Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures. The oldest form of biometric verification is fingerprinting. Historians have found examples of thumbprints being used as a means  … 

Biometrics definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Biometrics Reports
12 Matches
Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

ComputerWeekly.com

Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

Is Biometrics the Future of Security?
sponsored by One Identity
WHITE PAPER: Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics. Learn why it's important to your business's security and why passwords may not be unique enough anymore.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

CW Benelux February 2018
sponsored by ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ComputerWeekly.com

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

ISM December 2012
sponsored by SearchSecurity.com
JOURNAL ARTICLE: In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006

ISC2

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona
12 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement