IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
176 - 200 of 1712 Matches Previous Page  |  Next Page
Application Encryption and Security
sponsored by NetLib Security
WHITE PAPER: Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

NetLib Security

Application Security in the DevOps Environment
sponsored by HCL Software
RESEARCH CONTENT: Application security (AppSec) has grown in importance, especially in the DevOps environment. This report from the Ponemon Institute looks to understand the state of application vulnerabilities and testing, as well as AppSec risks, potential consequences, and best practices – read on to unlock the full report.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

HCL Software

Approaches to Micro-Segmentation: Pros and Cons
sponsored by ColorTokens
RESOURCE: Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.
Posted: 05 Oct 2020 | Published: 22 Apr 2020

ColorTokens

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Are you securing the right things? How to effectively secure your data
sponsored by ComputerWeekly.com
WHITE PAPER: The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.
Posted: 21 Oct 2011 | Published: 13 Oct 2010

ComputerWeekly.com

Around the World in 34 Phish: COVID-19 Phishing Examples
sponsored by Inky Technology
RESOURCE: The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Inky Technology

ASD/ACSC Maturity Model 2019 – Three Things You Need to Check
sponsored by Ivanti ANZ
RESOURCE: The Australian Signals Directorate (ASD)/Australia Cyber Security Centre (ACSC) breaks down their model into a 3-level self-assessment in order to help organizations on their journey towards maturity. In this article, discover 3 simple things to check for your level 3 maturity self-assessment.
Posted: 22 Apr 2020 | Published: 16 Oct 2019

Ivanti ANZ

At A Glance: CrowdStrike® Falcon Discover™ For AWS
sponsored by AWS & CrowdStrike
PRODUCT OVERVIEW: As organisations opt to host more of their data in the cloud, securing their cloud environments has never been more important. This solution brief offers 5 considerations for choosing a cloud security solution and highlights how CrowdStrike’s Falcon Defense CrowdStrike Falcon Discover can address common AWS challenges – read on to get started.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

AWS & CrowdStrike

AT&T Content Delivery Network (ACDN) - KONA Web Security and Prolexic DDoS Services
sponsored by AT&T Cybersecurity
PRODUCT OVERVIEW: The AT&T CDN with Web Security suite is a bundle of cloud-based web security services designed to help secure your customer’s websites, apps and other assets at the CDN layer. In this product brief, explore its key features and discover how it can help defend against distributed denial of service (DDoS) and other advanced cyberthreats.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

AT&T Cybersecurity

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Australian Insurance provider establishes comprehensive risk management program
sponsored by ServiceNow
CASE STUDY: In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.
Posted: 05 Feb 2020 | Published: 30 Nov 2018

ServiceNow

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Authenticate Consumer and Employee Digital Identities Seamlessly
sponsored by IBM
RESOURCE: Learn about IBM Cloud Identity and how your company can authenticate consumer and employee digital identities seamlessly.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

IBM

Automated Cloud Governance: The ONUG Collaborative
sponsored by Concourse Labs
WHITE PAPER: As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

MuleSoft

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Assessing Hyper-converged Infrastructures Based on Feature Capabilities
sponsored by Pure Storage
EGUIDE: In this expert guide, 20-year industry veteran Jacob Gsoedl demonstrates how hyper-converged systems differ from traditional storage systems. Read on to get a run-down of the top considerations buyers should have on their checklist for evaluating, purchasing, and deploying HCI, and more.
Posted: 14 Aug 2017 | Published: 10 Aug 2017

Pure Storage

Assessing Hyper-converged: Products, Scalability, and Ecosystem Support
sponsored by Lenovo and Intel
EGUIDE: From the experts at SearchConvergedInfrastructure.com, this guide assesses several types of HCI architectures based on featured capabilities—including cost model, data protection, and resiliency. Read on to see the analysis, as well as to answer the burning question, "Why is the HCI definition so varied?"
Posted: 01 Aug 2017 | Published: 31 Jul 2017

Lenovo and Intel

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp
176 - 200 of 1712 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info