IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
176 - 200 of 1177 Matches Previous Page  |  Next Page
Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

Case Study: How Hyatt Gave Developers More Time to Innovate
sponsored by Splunk
WHITE PAPER: When developers wind up spending most of their time identifying and troubleshooting issues, their ability to innovate is ultimately jeopardized. Click to learn about a platform that can provide real-time visibility across multiple or even hundreds of environments and can help give developers their lives back.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Splunk

Case Study: How ITIL Literally Keeps the Lights On
sponsored by ServiceNow
CASE STUDY: As a major electricity supplier, TransAlta relies heavily on its IT capabilities. With more than 2,300 employees, TransAlta also needs to ensure that its business services and desktop infrastructure effectively supports its ongoing operations. Download this eBook to learn how TransAlta powers IT Service management and IT Operations with ServiceNow.
Posted: 23 Jan 2018 | Published: 01 Jul 2016

ServiceNow

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Case Study: How supercomputing is transforming experimental science
sponsored by ComputerWeekly.com
EGUIDE: NERSC lead data scientist Debbie Bard talks about how large-scale data analytics using super computers is making new types of science possible
Posted: 09 May 2019 | Published: 09 May 2019

ComputerWeekly.com

Case Study: Optimizing Aging IT Processes with Automation and Machine Learning
sponsored by Ayehu
CASE STUDY: See firsthand how a multi-national company counteracted aging and ineffective IT practices through automation, analytics-driven support tools, and even machine learning – all to earn their competitive edge back.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ayehu

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

Channel Security Experts Deep Dive: The Anatomy of an MSP Breach
sponsored by Datto, Inc.
WEBCAST: In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.
Posted: 16 Oct 2019 | Premiered: Oct 16, 2019

Datto, Inc.

CIO and IT leadership survey
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT budgets are increasing and IT leaders have more influence at board level as organisations invest in agile, innovative projects, according to this survey by IT management consultant Coeus Consulting.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

ComputerWeekly.com

CIO Trends #3
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

ComputerWeekly.com

CIO Trends #4
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at the topics that should be high on the agenda for anyone wanting to stay on top of their game- and the challenges that come with that. Find out what makes a successful IT leader in 2017, from looking outwards to learning lessons from digital transformation, and how to converge IT and digital skills in your organisation.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

ComputerWeekly.com

CIO Trends Asean Q1 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide offers a collection of our most popular articles for IT leaders in Asean during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

ComputerWeekly.com

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

CA ARCserve Backup r12.5 SRM Features
sponsored by arcserve
VIDEO: CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Case Study: County Withstands a Near-Crippling Cyberattack
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, discover how San Deigo County withstood this almost devastating attack on election night.
Posted: 13 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Enterprise

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case study: Sicoob avoids USD 1.5 million in annual costs with IBM
sponsored by IBM
CASE STUDY: This case study reveals how Credit Union System for Brazil (Sicoob), the largest credit union system in Brazil, replaced their existing IT infrastructure with a virtualized Linux landscape, allowing them to avoid USD 1.5 million in annual costs.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

CIOs Future-Proof the Data Center with Hybrid Strategies
sponsored by Attenda
EGUIDE: In this expert e-guide, we explore how to design a hybrid strategy that helps balance public and private cloud services with on-premise systems. Hear from a variety of CIOs who have successfully integrated legacy and cloud technology to take a more flexible and efficient approach to managing their data centers.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

Attenda

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco
176 - 200 of 1177 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement