Biometrics

Biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. Examples of physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements.
Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
By: GE Healthcare     Published Date: Oct 14, 2015
Download this Interactive Resource Guide today to learn more about the role GE Healthcare plays in optimizing healthcare organizations’ investment in imaging IT to help streamline healthcare costs, increase diagnostic confidence and enhance the quality of patient care.
Tags : gneral electric, ge helathcare, imaging, workglow, centricity, archiving, biometrics, mobile data systems
     GE Healthcare
By: Seagate Technology     Published Date: May 15, 2015
An inside look at how IT Executives and System Integrators are managing video surveillance data.
Tags : system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems
     Seagate Technology
By: Nexsan by Imation     Published Date: May 11, 2015
Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.
Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
     Nexsan by Imation
By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.
Tags : video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras, biometrics, best practices, business activity monitoring
     Seagate Technology
By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance systems are evolving from being used primarily for security purposes to being used for analytics and improved ROI. With that in mind, it's important to consider many factors and how they affect the architecture of your surveillance system. This webinar will provide some of the top trends that may affect the outcome of your storage architecture.
Tags : surveillance, seagate, surveillance hdd, surveillance solutions, ip storage, storage management, biometrics
     Seagate Technology
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
     Thawte
By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
     Webroot
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
     DigitalPersona UK
By: Symantec     Published Date: Jun 02, 2011
Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.
Tags : symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software, windows 7 ultimate edirion, performance metrics, anti virus
     Symantec
By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp
     Confident Technologies
By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
     Kingston
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
     M3 Consulting, Inc.
By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam
     The Bunker
By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
     Gartner, Inc
By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : penetration, test, pen, tracesecurity, risk, assessment, social, engineering
     TraceSecurity
By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking, governance
     xmannnnn
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.