X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 biometric device


Identix Leads Biometric Authentication
Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the

biometric device  Leads Biometric Authentication Identix Leads Biometric Authentication Featured Author -  Laura Taylor - January 27, 2002 Vendor Background Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon for Windows 2000 and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security. A pioneer

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » biometric device

Wetmetrics


The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application.

biometric device   Read More

Integrated Workforce Management (WFM) Platforms: Fact or Fiction? - Part 1


In her recent blog post 12 Things Retailers Did Last Year To Improve Supply Chain... IDC’s analyst Leslie Hand said that many retailers, as one of the top three priorities of the last year, implemented new “pay and bonus for performance” structures based on current labor standards/time management or simply applied new labor standards to their distribution centers (DCs) and warehouse work. Some

biometric device   Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

biometric device   Read More

Brave New World-Biometrics in HR


Human resources (HR) professionals often have to deal with errors in recording employees’ effectiveness while accomplishing their jobs. My colleague Ted Rohm gives an overview in this recent blog post of how biometrics can help with these HR challenges. He makes the case that biometrics technology is an option worth considering for certain aspects of business operations. As Ted mentions in his

biometric device   Read More

Securing Mobile Apps in a BYOD World


The next wave of exploiting the power of mobile devices involves the apps that run on them. Increasingly, enterprise IT organizations will be under pressure to build or purchase mobile apps that meet the requirements of enterprise employees and business units. Firms will need security that can span multiple devices and heterogeneous IT systems and provides protection for the devices and their data. For most organizations, a scarcity of resources for mobile app development and the lack of mobile security expertise can prevent an adequate IT response to this challenge. Read this white paper to learn more about mobile security solutions and how to meet today's mobile app demands and challenges.

biometric device   Read More

Leveraging Device Generated Data for Business Growth


Businesses today are recognizing that data is an asset and proper analysis can help generate higher efficiencies, lower costs, improve customer service, and define new products. There is sizable excitement around this, especially as new sources of data are being tapped every day. However, a successful data management requires investment in people, processes, and technology. Most organizations fail because they lack the commitment required from management to create a holistic data-centric organization.

biometric device   Read More

Sage Mobile Device Survey Shows Interesting Findings


Sage recently announced the results of its second annual mobile device survey, which polled 1,090 small- and medium-sized businesses (SMBs) in the U.S. The results include findings about the adoption of mobile devices in the business world and what positive effects mobile device usage is providing for SMBs today.

biometric device   Read More

The Handspring Visor Goes Wireless ~Look out Palm VII!


The Palm VII has the advantage of being an all-in-one device, however the Handspring Visor comes with 8MB of RAM and can be upgraded, allowing a user adequate room for growth.

biometric device   Read More

Creating the Enterprise-class Tablet Environment


The tablet in the enterprise is a powerful new form factor, rich with device merits, productivity, and new strategic uses. Enterprises are on the cusp of a new mobile computing transformation, having moved past the siloed, field force-oriented deployments of three years ago and into the era of smartphone ubiquity in the workplace. Download this white paper to learn how to balance end-user and IT requirements.

biometric device   Read More

Google Acquires Smart, Connected Products Manufacturer Nest


Google has announced that it has entered into an agreement to buy smart device manufacturer Nest Labs for $3.2 billion (USD) in cash. Now the future of smart, connected products takes on an entirely new twist with Google strongly in the mix.

biometric device   Read More