IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed   
Global Trading Identification Numbers White Papers (View All Report Types)
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

GUIDE TO AV REPLACEMENT
sponsored by Crowdstrike
WHITE PAPER: As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Crowdstrike

Future of the SOC Forces shaping modern security operations
sponsored by Chronicle
WHITE PAPER: The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Chronicle

Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Don’t Just Educate: Create Cybersafe Behaviour
sponsored by Mimecast
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020

Mimecast

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER: Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER: In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences