IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

EPC

RSS Feed   
EPC Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Core - DNS - The Big Easy - 3 steps to better security
sponsored by Cisco Umbrella
WEBCAST: When it comes to cybersecurity, there are 3 main ‘ways’ in which data breaches occur. In this webinar, take a closer look at the top challenge areas facing IT security teams, and discover the 3 methods in which attacks happen & how to stop them.
Posted: 03 Feb 2020 | Premiered: Dec 11, 2019

Cisco Umbrella

The Risk Conversation
sponsored by IT Glue
EBOOK: This e-book provides guidelines for having the risk conversation with your clients and how it can benefit you as an MSP. Download now for more info on the 4 pillars of risk management, using risk assessments in sales and QBRs, and more
Posted: 21 Feb 2020 | Published: 21 Feb 2020

IT Glue

Benefits of Digital Transformation for Oil and Gas Companies
sponsored by TIBCO
WHITE PAPER: A recent IDC Analyst Infobrief outlined 6 specific challenges in making sense of oil and gas companies’ data that posed the greatest concern. Access this white paper to view these challenges and to gain exposure to 3 use cases that reveal how analytics can help you outcompete your peers in the oil and gas industries.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

TIBCO

2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

DoorDash: Remote Vendor Access Security Goes Out the Window
sponsored by CyberArk Software, Inc
CASE STUDY: In the wake of a massive data breach that affected nearly 5 million stakeholders, DoorDash, a food delivery service, needed a remediation plan. Read this case study to discover what led to the breach, and the 4 actionable steps DoorDash implemented for reducing the risk of remote vendor access.
Posted: 25 Feb 2020 | Published: 01 Oct 2019

CyberArk Software, Inc

Third Party Privileged Access to Critical Systems
sponsored by Cyber-Ark Software
EBOOK: Third-party vendors play a pivotal role in the way business is conducted today. Yet, organizations tend to use antiquated methods, like VPNs, to allow access. In this e-book, explore the results of a recent CyberArk study into third-party privileged access and learn the steps your organization can take to ensure secure vendor access.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cyber-Ark Software

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT
 
Browse by Report Type:
EPC White Papers | EPC Multimedia | EPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info