IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
101 - 125 of 1456 Matches Previous Page  |  Next Page
Advanced Threat Prevention: 6 Vendors go Head to Head
sponsored by Cylance
RESEARCH CONTENT: See the results of an advanced threat prevention test of enterprise endpoint protection software where 6 competitor endpoint products – Cylance, Kaspersky, McAfee, Sophos, Symantec and Trend Micro – go head-to-head in 4 performance areas.
Posted: 05 May 2017 | Published: 02 Feb 2017

Cylance

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Advantage of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper seeks to outline in easy-to-understand language, the real difference between security fabrics and security platforms, each of which claims to be the next-generation in security architecture.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Fortinet, Inc.

AI: Beyond the hype
sponsored by ComputerWeekly.com
EGUIDE: Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?
Posted: 06 Nov 2017 | Published: 06 Nov 2017

ComputerWeekly.com

Aligning Enterprise Identity and Access Management with CIO Priorities
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

SearchSecurity.com

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits
sponsored by ComputerWeekly.com
WHITE PAPER: Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

Advantage of the CMOS Sensor: Latest image sensor technology for HD security
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This white paper features an improved video structure for security system cameras that provides high-definition (HD) picture quality and high-sensitivity sensors to ensure the top monitoring capabilities.
Posted: 03 Oct 2013 | Published: 31 Dec 2011

Sony Electronics Asia Pacific Pte Ltd

After the crisis: What now?
sponsored by IBM
WHITE PAPER: To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.
Posted: 26 Aug 2010 | Published: 09 Mar 2010

IBM

Agile IT Helps Customers Choose Aviva Health
sponsored by IBM
CASE STUDY: Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

An Expert Guide to Accelerating Deduplication
sponsored by Fujitsu
EGUIDE: This expert guide discusses the recent movement to accelerate deduplication and takes a hard look at how this technology compares to other disk-based backup solutions.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Fujitsu

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Analytics Solutions for LinuxONE: An Overview
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how LinuxONE extracts insights and scales effortlessly to meet your big data and analytics demands. Read on to learn how it can provide your enterprise with high performing business intelligence (BI) and cost effectively meet your availability expectations with IT operations analytics.
Posted: 25 Feb 2016 | Published: 31 Aug 2015

IBM

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Anomaly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WHITE PAPER: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Published: 24 Jan 2015

Prelert

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security
101 - 125 of 1456 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement