ComputerWeekly.com Research Library

Powered by Bitpipe.com

BiometricsResearch

  • Exercising Control Over Mobile Access

    Sponsored by: Aruba Networks

    In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.

  • Multi-Step Authentication and Why You Should Use It

    Sponsored by: Global Knowledge

    Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.

  • IT Security Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

  • Best Practices for mobile authentication

    Sponsored by: SearchSecurity.com

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

  • ISM December 2012

    Sponsored by: SearchSecurity.com

    In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • America's Quest for IPv6 - Part I: A Business Perspective

    Sponsored by: Command Information

    This paper emphasizes that American organizations must adopt IPv6 today and describes the features and functions that will keep them competitive on the global stage.

  • The 2008 (ISC)2 Global Information Security Workforce Study

    Sponsored by: ISC2

    Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.

  • 2006 Global Information Security Workforce Study

    Sponsored by: ISC2

    Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

  • Solving the Weakest Link in Network Security: Passwords

    Sponsored by: DigitalPersona

    This paper proposes improving security and authentication by using biometrics. Included are real stories demonstrating how this approach solves the password management nightmare, addresses compliance regulations and eliminates password costs.

Browse by Report Type: Biometrics White Papers | Biometrics Multimedia | Biometrics IT Downloads

See more topics related to: Biometrics

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.