Biometrics White Papers

Biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. Examples of physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements.
Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.

Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.

Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
By: Symantec     Published Date: Jun 02, 2011

Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.

Tags : symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software, windows 7 ultimate edirion, performance metrics, anti virus
    
By: Confident Technologies     Published Date: Mar 16, 2011

This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.

Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
    
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011

Offshoring Is a Cost Effective Solution to Your IT Needs

Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
    
By: The Bunker     Published Date: Nov 30, 2010

What questions should an organization ask about security and availability when contemplating a cloud computing model

Tags : cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam
    
By: Gartner, Inc     Published Date: Oct 28, 2010

New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.

Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
    
By: TraceSecurity     Published Date: Sep 15, 2010

This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.

Tags : penetration, test, pen, tracesecurity, risk, assessment, social, engineering
    
By: xmannnnn     Published Date: Aug 06, 2010

Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.

Tags : active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking, governance
    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.