All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
0:11
Close-up of a hand on a biometric fingerprint scanner under blue illu
…
1 month ago
Adobe
Stov
CMMC Section 3.5: Identification and Authentication
Jun 13, 2022
ntiva.com
Identification and Authentication - SlideServe
Jul 26, 2014
slideserve.com
What is the Difference between Identification, Identity Verification
…
Mar 7, 2022
pingidentity.com
2:23
What’s the difference between identification, authentication, and
…
2.7K views
4 months ago
Facebook
Prabh Nair
0:10
Dactylogram. fingerprint, biometry, Identification, authentication, face
…
Jan 4, 2023
Adobe
Anastasia
0:06
Animation of the fingerprint scanning process with a white sca
…
7 months ago
Adobe
Alexander Sulghin
1:33
Configure OpenVPN LDAP Based Authentication - kifarunix.com
5.6K views
Apr 18, 2020
kifarunix.com
12:27
Authentication vs. authorization
5 months ago
Microsoft
cilwerner
0:25
Discover the H-6500 Mix Value Counter, revolutionizing authentic
…
148.3K views
Mar 2, 2025
Facebook
Huaen Bill Counters
1:37
Aadhaar Authentication Via Face Recognition From July. How It Wil
…
Jan 15, 2018
NDTV
Sukirti Dwivedi
Authentication and authorization - ISC2 Certified in Cybersecurity (C
…
Aug 8, 2022
linkedin.com
Aadhaar Verification: The Comprehensive Guide to Digital Id
…
10 months ago
theprint.in
2:20
Fingerprint Recognition
74.7K views
Feb 16, 2016
YouTube
Private Security Professionals of America (PSPA)
3:46:13
C Programming Tutorial for Beginners
18.4M views
Aug 15, 2018
YouTube
freeCodeCamp.org
15:01
Introduction to Topographic Maps
1.1M views
Sep 25, 2013
YouTube
Seth Horowitz
2:49
uniFLOW - Scan to Microsoft SharePoint®
11.9K views
Aug 16, 2013
YouTube
uniFLOW - uniFLOW Online - uniFLOW sysHUB
2:11
An Introduction to DataDot Technology
15.2K views
Oct 1, 2015
YouTube
DataDots
2:31
uniFLOW - Scan to iW Desktop
2.2K views
Aug 16, 2013
YouTube
uniFLOW - uniFLOW Online - uniFLOW sysHUB
59:32
Virtual Session: NIST Cybersecurity Framework Explained
147.8K views
Nov 30, 2018
YouTube
RSA Conference
3:35
FORTNITE HOW TO BYPASS TWO-FACTOR AUTHENTICATION EASILY
361.7K views
Sep 5, 2018
YouTube
CoDCrafted
3:42
Microscopy. Identification of textile fibres
25.3K views
Nov 27, 2014
YouTube
Cultural Heritage Science Open Source, CHSOS
6:08
Digital Signatures Explained - Keep your's Safe!!!
555.6K views
Nov 25, 2016
YouTube
Technical Guruji
2:09
Fast and Seamless travel at Changi by IDEMIA
142.6K views
Oct 9, 2018
YouTube
IDEMIA Group | Unlock the World
1:09
Employee Time Tracking Biometric Identification Clock WaspTime B2
…
26.8K views
Oct 18, 2012
YouTube
Wasp Barcode Technologies
6:54
Biometric integration with Suprema BioStar v.1.6, BioEntry Plus & Bos
…
145.4K views
Nov 4, 2012
YouTube
Panagiotis Karagiannis
6:50
NIST 800-53 Control Families - Identification and Authentication (IA)
6.8K views
Mar 20, 2021
YouTube
D-Vine Consulting
9:56
Activating a PIV Authentication certificate on a CAC. ONLY neede
…
66.5K views
Sep 18, 2017
YouTube
Michael J Danberry
1:01
How do I get a certified copy of my birth certificate?
22.2K views
Mar 5, 2012
YouTube
nycgov
3:40
How to set up two-factor authentication for iCloud
65.6K views
Jul 2, 2014
YouTube
Macworld
See more videos
More like this
Feedback