IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
101 - 125 of 1535 Matches Previous Page  |  Next Page
Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Achieving Full Transparency and Centralized Control in OT Environments with Fortinet
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Maintaining security, visibility and control during the convergence of information technology (IT) and operational technology (OT) requires an end-to-end security architecture that eases the stressful workload of network operations analysts. Read on to learn how Fortinet may be able to deliver.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

Fortinet, Inc.

Achieving HIPAA Compliance with Alcide Kubernetes Security
sponsored by Alcide
WHITE PAPER: The need better security patient PHI in the US led to the inception of HIPAA. The following white paper outlines the key objectives of HIPAA, the challenges of achieving compliance in cloud-native environments, and how to ensure intersectional PHI security between HIPAA and the NIST Cybersecurity Framework.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Alcide

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Adapting IT Operations to Uncertain Times
sponsored by ServiceNow
WHITE PAPER: The COVID-19 crisis probably wasn’t accounted for in your organization’s business continuity plans – and why would it be? Dive into this guide to learn about the three IT challenges in the new world post-COVID-19.
Posted: 18 May 2020 | Published: 18 May 2020

ServiceNow

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

AI For Cybersecurity
sponsored by IronNet
WHITE PAPER: With the cost and frequency of cyberattacks expected to continue to rise, what can organizations do to meet these sophisticated threats? This white paper breaks down how artificial intelligence, when used effectively, can strengthen threat detection and response. Read on to learn more.
Posted: 23 Apr 2020 | Published: 16 Apr 2020

IronNet

AI: Beyond the hype
sponsored by ComputerWeekly.com
EGUIDE: Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?
Posted: 06 Nov 2017 | Published: 06 Nov 2017

ComputerWeekly.com

AI: The Latest IT Tool
sponsored by ServiceNow
EGUIDE: It's important for IT professionals like yourself to know how to distinguish the good AI tools from the bad. That's where this E-Guide should come in handy. Download this E-Guide to learn how artificial intelligence capabilities are augmenting the day-to-day IT tools you're most familiar with.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

ServiceNow

AIOps Applications in Containers, Monitoring, and More.
sponsored by ServiceNow
EGUIDE: Download this E-Guide to learn why AIOps has quickly becoming a central tool within modern IT departments’ arsenals, and how AIOps tools are being used in areas like container monitoring, proactive resolutions, and more.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

ServiceNow

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

After the crisis: What now?
sponsored by IBM
WHITE PAPER: To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.
Posted: 26 Aug 2010 | Published: 09 Mar 2010

IBM

Agile IT Helps Customers Choose Aviva Health
sponsored by IBM
CASE STUDY: Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM
101 - 125 of 1535 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info