IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Electronic Product Codes

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: EPC, GTIN, Global Trading Identification Numbers
DEFINITION: The RFID equivalent of the current barcode for identifying product manufacturer and type.
Electronic Product CodesMultimedia (View All Report Types)
51 - 75 of 114 Matches Previous Page  | Next Page
Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

Joffe & Kindervag Explain DDoS Mitigation
sponsored by Neustar®
WEBCAST: This crucial webcast takes an in-depth look at DDoS attacks, discussing how they became such a global threat and what your organization can do to mitigate them.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Optimizing Systems of Engagement & Capture Operations with Analytics
sponsored by Kofax, Inc.
WEBCAST: Tune into the following webinar to uncover an analytics solution that can work seamlessly in an enterprise capture environment. Learn how this solution can enable your business to achieve a clear understanding of your operational performance and more.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

Kofax, Inc.

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Podcast: Emerging Security Threats: Know Your Enemy in 2014
sponsored by Imperva
PODCAST: Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Johanne B. Ullrich, dean of research for the SANS Technology Institute, shows you how.
Posted: 03 Mar 2014 | Premiered: Feb 24, 2014

Imperva

Podcast: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
PODCAST: This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 26 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute Software
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute Software

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date
sponsored by Webroot
WEBCAST: Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
Posted: 30 Aug 2012 | Premiered: Sep 6, 2012

Webroot

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Online Trial: Rational System Architect
sponsored by IBM
SOFTWARE DOWNLOAD: Try IBM® Rational® System Architect® V11.3, which enables business managers and IT professionals to plan, model, and execute changes to improve their business strategy and process as well as the IT systems and infrastructure that support them, enabling successful enterprise planning and transformation.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault
51 - 75 of 114 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement