IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

RFID Systems

RSS Feed   
DEFINITION: An RFID virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID (radio frequency identification) system. The deliberate creation and spreading of this type of virus is called RFID hacking. RFID technology, which uses tiny radio frequency (RF) transmitters and receivers to uniquely identify objects, is an increasingly popular alternative to bar code technology in supply  … 

RFID Systems definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
RFID Systems Multimedia (View All Report Types)
 
JSM Incident Management Overview Video Premium Upsell
sponsored by Atlassian
VIDEO: Incident management platforms speed up IT processes, escalating problems to the right person and shortening response times. This quick two minute video covers one company's ITSM platform, and takes you on a tour through the program.
Posted: 23 Nov 2020 | Premiered: 09 Nov 2020

Atlassian

Why DevOps Has Not Become DevSecOps
sponsored by WhiteHat Security
WEBCAST: Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.
Posted: 18 Nov 2020 | Premiered: Nov 18, 2020

WhiteHat Security

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Umbrella - Cisco TV - Transforming IT Security with SASE - English
sponsored by Cisco Umbrella
WEBCAST: With the adoption of cloud-delivered services, SD-WAN has proved that it can deliver improved application performance, reduced costs and simplified branch operations. But despite all these benefits, security remains one of the biggest concerns. Leverage this webinar to see how SASE can deliver multiple security functions from the cloud.
Posted: 26 Feb 2021 | Premiered: Apr 8, 2020

Cisco Umbrella

Securing Your Data Stored in OneDrive: SailPoint Demo
sponsored by SailPoint Technologies
VIDEO: In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.
Posted: 23 Jul 2020 | Premiered: 23 Jul 2020

SailPoint Technologies

The importance of identity in securing your business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Introduction to Perspectium
sponsored by ServiceNow
WEBCAST: This video highlights the two major problems Perspectium can solve for ServiceNow customers: automating data extraction at volume and velocity, for archive, backup/restore, reporting and analytics, migrations, and more and providing a platform for service providers to connect with their customers throughout the service relationship.
Posted: 06 Nov 2020 | Premiered: Nov 6, 2020

ServiceNow

SailPoint Identity Now: Certification Creation
sponsored by SailPoint Technologies
VIDEO: Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.
Posted: 28 Jul 2020 | Premiered: 28 Jul 2020

SailPoint Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info