IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Retinal Scan

RSS Feed   
ALSO CALLED: Iris Scanning
DEFINITION: Retinal recognition by means of scanning blood vessel patterns of the retina and the pattern of flecks on the iris.
Retinal Scan Reports
76 - 100 of 1164 Matches Previous Page  |  Next Page
Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

AI: Beyond the hype
sponsored by ComputerWeekly.com
EGUIDE: Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?
Posted: 06 Nov 2017 | Published: 06 Nov 2017

ComputerWeekly.com

AIOps Takes the Lead on Root Cause Analysis
sponsored by ServiceNow
ESSENTIAL GUIDE: Of all the recent developments in the IT operations sphere, automated root cause analysis is one that has many enterprises salivating. But despite the obvious interest around AIOps, many IT monitoring vendors are hesitant about jumping on the bandwagon. Keep reading to hear what you could stand to gain from AIOps.
Posted: 03 May 2019 | Published: 02 May 2019

ServiceNow

Aligning Enterprise Identity and Access Management with CIO Priorities
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

SearchSecurity.com

Alleviate Technical Debt : A Practical Path to IT Modernization
sponsored by Red Hat
WHITE PAPER: There are several core approaches you can take to advance your IT modernization efforts, which this white paper closely examines. Read on to view these four pragmatic methods for structuring your initiatives, as well as discover a viable first step for your modernization path: UNIX-to-Linux migration.
Posted: 02 Mar 2018 | Published: 31 Dec 2016

Red Hat

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits
sponsored by ComputerWeekly.com
WHITE PAPER: Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

Anderson IT Management Builds World-Class Hosting Platform with Hyperconverged Infrastructure
sponsored by Pivot3
CASE STUDY: Read this study to learn why, after thorough evaluation, Anderson IT chose a hyper-converged system as the foundation for their cloud hosting platform, including the specific benefits HCI brings to private cloud.
Posted: 16 Jan 2019 | Published: 31 Dec 2017

Pivot3

Architecting End User Computing Solutions
sponsored by Nutanix
WHITE PAPER: What are the possible infrastructures at your disposal that will streamline and simplify EUC project completion? Download this e-book to view several options for VDI and EUC environments, and to learn how to implement them in your organization, such as converged infrastructure, hyper-converged infrastructure, and more.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Nutanix

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Are you securing the right things? How to effectively secure your data
sponsored by ComputerWeekly.com
WHITE PAPER: The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.
Posted: 21 Oct 2011 | Published: 13 Oct 2010

ComputerWeekly.com

After the crisis: What now?
sponsored by IBM
WHITE PAPER: To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.
Posted: 26 Aug 2010 | Published: 09 Mar 2010

IBM

Agile IT Helps Customers Choose Aviva Health
sponsored by IBM
CASE STUDY: Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

MuleSoft
76 - 100 of 1164 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement