IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
1 - 25 of 1813 Matches Previous Page  |  Next Page
10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

10 ITSM Mistakes You're Probably Making
sponsored by Samanage
WHITE PAPER: Open this guide to learn about the 10 biggest mistakes that can occur within ITSM projects, from personnel inconsistencies to neglecting service quality. In addition to learning how to recognize these tell-tale signs, you'll also find tips for overcoming and dodging these mistakes before they manifest into bigger problems.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Samanage

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

150 Ways to Automate Service Management
sponsored by Samanage
WHITE PAPER: Opportunities for automation can spring up throughout the organization – if you know where to look. Keep reading to learn over 150 ways service automation can be integrated within your organization, from IT to HR.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Samanage

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
ANALYST REPORT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Fortinet, Inc.

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

ComputerWeekly.com

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018


10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Questions to Ask Your File Gateway Consolidation Vendor
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

10 Reasons Enterprises are Moving Security to the Cloud
sponsored by Zscaler
WHITE PAPER: Organizations have already recognized the value in moving apps to the cloud – now they're looking to migrate their security as well. Learn about the Zscaler Security Cloud and discover 10 reasons enterprises have started moving security to the cloud.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

18 Windows 10 Facts IT Must Know
sponsored by VMware
EGUIDE: Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

2016 State of Crowdsourced Innovation
sponsored by Spigit
WHITE PAPER: Read this report to discover the 2016 landscape of crowdsourced innovation, highlighting essential best practices for running sustainable innovation programs. Download now to learn why enterprises are tapping crowdsourcing as a way to innovate, and what returns you should expect.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Spigit

2018 Cloud Security Report
sponsored by Ixia - Keysight
RESEARCH CONTENT: This research report explores how the security ecosystem is evolving in 2018 to tackle the challenges of an expanding attack surface. Get insights on all things cloud security – from the changing motivations and behaviors of threat actors to changes in the privacy landscape – and explore the report's 5 key findings.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

2018 Cyberthreat Defense Report
sponsored by Imperva
RESEARCH CONTENT: This 2018 Cyberthreat Defense Report examines data polled from 1,200 qualified IT security decision-makers and practitioners and compares the results with findings from previous years. Explore the report's key findings about the impact that cloud, mobile devices, containers, and threat intelligence are having on cybersecurity.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Imperva

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Life Hacks for Rationalizing your Application & Technology Portfolios
sponsored by Mega International
VIDEO: When streamlining your IT portfolio your goal is to free up budget for new initiatives, and you need an efficient method of doing so. This webcast covers three life hacks to help you work smarter, not harder, when engaging in an IT portfolio rationalization project.
Posted: 10 Jan 2018 | Premiered: 10 Jan 2018

Mega International

3 Steps to Faster EMR Adoption with Desktop Virtualization
sponsored by Imprivata
WHITE PAPER: Inside, uncover a 3-step process that will not only help you accelerate EMR adoption and achieve Meaningful Use but also provides the benefits of two extremely helpful technologies: desktop virtualization and VDI.
Posted: 04 Sep 2013 | Published: 30 Dec 2011

Imprivata
1 - 25 of 1813 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement