IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
51 - 75 of 1068 Matches Previous Page  |  Next Page
A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Access Management Handbook
sponsored by Thales
EBOOK: The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.
Posted: 23 Mar 2020 | Published: 30 Sep 2019

Thales

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Absolute Software Corporation

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Accelerate the delivery of modern applications
sponsored by Hewlett Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett Packard Enterprise

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Enterprise

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.
51 - 75 of 1068 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences