IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
1 - 25 of 1236 Matches Previous Page  |  Next Page
10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

2019 Cybersecurity Report Card
sponsored by DomainTools
WHITE PAPER: If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

2019 State of the Firewall
sponsored by FireMon
RESOURCE: The gap between innovation and security can lead to errors, accidental exposure, or service disruptions. In this 2019 state of the firewall infographic, learn why network security risk is at an all-time high and more.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

FireMon

2019 Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Every year, Trustwave releases a Global Security Report that highlights the common cyberattack trends across the year in order to provide organizations with key insights and real-world data so they can be better prepared. Download this report to read through the 2019 Global Security Report.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Trustwave

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As technology enables organizations to improve the way they do business, the cybersecurity landscape evolves to reflect this change – both in terms of cyberattacks and security tactics. This e-book highlights the top cybersecurity trends of 2020, designed to guide organizations towards a secure network, today and in the years to come.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Cisco Umbrella

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

ComputerWeekly.com

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

4 Reasons to Replace Your Traditional Storage with Hyperconverged Infrastructure
sponsored by Comport Consulting
RESOURCE: This blog post outlines 4 reasons motivating organizations to migrate from their legacy storage to robust hyperconverged infrastructure (HCI) models. Read on to determine if your enterprise could similarly benefit from HCI.
Posted: 13 Nov 2019 | Published: 30 Nov 2018

Comport Consulting

4 Steps to Cloud Access Management
sponsored by Thales
WHITE PAPER: Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.
Posted: 30 Mar 2020 | Published: 30 Sep 2019

Thales

5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

5 Key Ways CISOs Can Accelerate the Business
sponsored by Splunk
WHITE PAPER: According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Splunk

5 Reasons to Make Virtual Support Agent Adoption a Priority
sponsored by Serviceaide
WHITE PAPER: Inside, find a list of five reasons to consider a virtual support agent, including improved service user experiences, increased automation opportunities, and more.
Posted: 03 May 2019 | Published: 03 May 2019

Serviceaide

5 Stages of Incident Management and How to Improve Them
sponsored by Atlassian
WHITE PAPER: Download this guide to learn about the five core stages of the modern incident management process – and why understanding the ins-and-outs of each stage is so important in today's world.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Atlassian

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

18 Windows 10 Facts IT Must Know
sponsored by VMware
EGUIDE: Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE
1 - 25 of 1236 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info