IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
226 - 250 of 1450 Matches Previous Page  |  Next Page
Case Study: Convergys Corporation and Server Automation
sponsored by MicroFocus
CASE STUDY: In order to automate server builds and achieve faster provisioning, Convergys decided to utilize a server automation suite. Download this case study to read Convergys' results in their entirety, with the top 10 benefits realized from server automation deployment.
Posted: 15 Feb 2018 | Published: 31 Dec 2017

MicroFocus

Case Study: Drive IT Transparency and Integration
sponsored by ServiceNow
CASE STUDY: One company had an overly complex IT environment that was non-ITIL compliant. Read the case study to learn how they were able to achieve consolidation, self-service automation and transparency with a single system of record.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

ServiceNow

Case Study: How ITIL Literally Keeps the Lights On
sponsored by ServiceNow
CASE STUDY: As a major electricity supplier, TransAlta relies heavily on its IT capabilities. With more than 2,300 employees, TransAlta also needs to ensure that its business services and desktop infrastructure effectively supports its ongoing operations. Download this eBook to learn how TransAlta powers IT Service management and IT Operations with ServiceNow.
Posted: 23 Jan 2018 | Published: 01 Jul 2016

ServiceNow

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Case Study: How to Secure Endpoints even at Low Internet Bandwidth
sponsored by Seqrite
CASE STUDY: With the evolving complexities and volume of threats, Posco wanted a one-stop security tool that could help secure their network even at low Internet bandwidth. Learn about why Posco choose an endpoint security tool to overcome this challenge.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Seqrite

Case Study: Modernizing Service Desk Eliminates Outage Time
sponsored by ServiceNow
CASE STUDY: One regional health care provider's IT team struggled with a legacy ticketing system, ad hoc processes and disparate systems, and the need to enhance service quality. Read on to learn how investing in ITIL and ITSM tools benefited every aspect of this health care provider's business practices and improved their overall quality of service.
Posted: 24 Jan 2018 | Published: 31 Jul 2017

ServiceNow

Case Study: Nationwide Mutual and Server Automation
sponsored by MicroFocus
CASE STUDY: By accessing this case study, you'll learn how to streamline server provisioning and maintenance by eliminating platform-engineering silos with a server automation platform. The specifics are inside, including how Nationwide Mutual also used the platform to establish a foundation for their cloud initiatives.
Posted: 13 Feb 2018 | Published: 31 Dec 2017

MicroFocus

CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

CIO and IT leadership survey
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: IT budgets are increasing and IT leaders have more influence at board level as organisations invest in agile, innovative projects, according to this survey by IT management consultant Coeus Consulting.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

ComputerWeekly.com

CIO Trends #3
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

ComputerWeekly.com

CIO Trends #4
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at the topics that should be high on the agenda for anyone wanting to stay on top of their game- and the challenges that come with that. Find out what makes a successful IT leader in 2017, from looking outwards to learning lessons from digital transformation, and how to converge IT and digital skills in your organisation.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

ComputerWeekly.com

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: County Withstands a Near-Crippling Cyberattack
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, discover how San Deigo County withstood this almost devastating attack on election night.
Posted: 13 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Enterprise

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Case Study: How the University of Salzburg Built a Self-Service IT Portal
sponsored by Red Hat
CASE STUDY: Learn from the Paris Lodron University of Salzburg's case how using an IaaS cloud platform enabled them to streamline access to IT services and resources. Access now to learn how to achieve automated deployment of IT services, improve resource scalability with integrated open source solutions, and more.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Red Hat

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY: This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011

FireEye

Case Study: Rochford District Council Secures 25 Years' of History with Acronis
sponsored by Acronis NEMEA
CASE STUDY: Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more.
Posted: 31 May 2011 | Published: 31 May 2011

Acronis NEMEA

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Case study: Sicoob avoids USD 1.5 million in annual costs with IBM
sponsored by IBM
CASE STUDY: This case study reveals how Credit Union System for Brazil (Sicoob), the largest credit union system in Brazil, replaced their existing IT infrastructure with a virtualized Linux landscape, allowing them to avoid USD 1.5 million in annual costs.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ
226 - 250 of 1450 Matches Previous Page    8 9 10 11 12 13    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement