IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Biometry

RSS Feed   
Biometry Reports
 
Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

ComputerWeekly.com

CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
sponsored by ComputerWeekly.com
EZINE: Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
Posted: 27 Sep 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006

ISC2

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

ISM December 2012
sponsored by SearchSecurity.com
JOURNAL ARTICLE: In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement