IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
101 - 125 of 1145 Matches Previous Page  |  Next Page
ASICS Automates Incident Management and Resolution With Real-Time Log Analysis
sponsored by Splunk
CASE STUDY: In order for ASICS to combat cyberthreats and address incidents at the very moment they occur, ASICS required a central platform to manage, correlate and analyze logs generated from multiple systems. In this case study, learn about the ASICS' experience using Splunk Enterprise.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk

Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

Authentication Devices
sponsored by HID Global
PRODUCT OVERVIEW: Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

Automating the Business of Science with Applications
sponsored by ServiceNow
VIDEO: A national science and engineering research lab provides support and services to over 12,000 users with diverse regional, functional, and divisional requirements. This called for a renovation in how they handled their IT service management. Find out how the lab benefitted from this service overhaul.
Posted: 25 Jan 2018 | Premiered: 19 Jan 2018

ServiceNow

Automating the IT Service Desk
sponsored by ServiceNow
ESSENTIAL GUIDE: Since its inception, the IT service desk has provided an intuitive portal designed to make it easier for users to get technical help – and for IT associates to keep on top of support workflows. So what happens when automation is thrown into the mix? Dive into this E-Guide to take a closer look.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

ServiceNow

Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
WHITE PAPER: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

BeneluxIT Priorities 2017
sponsored by ComputerWeekly.com
EGUIDE: This year's Computer Weekly and TechTarget IT Priorities survey has revealed that IT decision makers at Benelux based organisations are less confident, than counterparts in most other parts of Europe, that IT budgets will rise this year.Only 28% of them think budgets will increase.
Posted: 06 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

Best Practices for Improving Mobile Data Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

SearchSecurity.com

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Assessing Hyper-converged Infrastructures Based on Feature Capabilities
sponsored by Pure Storage
EGUIDE: In this expert guide, 20-year industry veteran Jacob Gsoedl demonstrates how hyper-converged systems differ from traditional storage systems. Read on to get a run-down of the top considerations buyers should have on their checklist for evaluating, purchasing, and deploying HCI, and more.
Posted: 14 Aug 2017 | Published: 10 Aug 2017

Pure Storage

Assessing Hyper-converged: Products, Scalability, and Ecosystem Support
sponsored by Lenovo and Intel
EGUIDE: From the experts at SearchConvergedInfrastructure.com, this guide assesses several types of HCI architectures based on featured capabilities—including cost model, data protection, and resiliency. Read on to see the analysis, as well as to answer the burning question, "Why is the HCI definition so varied?"
Posted: 01 Aug 2017 | Published: 31 Jul 2017

Lenovo and Intel

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
EGUIDE: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett Packard Enterprise

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Best Practices for Boosting Sales and Navigating MSP Pricing
sponsored by Quosal
EGUIDE: In this expert e-guide, discover insights into the sales process and learn how more organized management can help you bust quotas. Also, explore the methods managed service providers leverage—both homegrown and commercial—that help them nail down their pricing calculations.
Posted: 02 Feb 2016 | Published: 28 Jan 2016

Quosal
101 - 125 of 1145 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement