IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

EPC

RSS Feed   
EPC Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Protect Your Sensitive Data
sponsored by Thales
EGUIDE: When it comes to integrating a data protection solution, there are several considerations organizations need to understand prior to choosing a partner, namely – are you looking to protect data at rest, data in motion or both? Read on to unlock a step-by-step guide to finding the right data protection solution for your organization.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

How to Eliminate Security & Compliance Impediments on Your Journey to the Cloud
sponsored by AWS - Anitian
VIDEO: In this webcast, learn the business, security, and DevOps benefits of automating security, get an inside look at security automation and how it helps DevOps teams, and discover how to achieve the fastest time-to-market possible on AWS by leveraging cloud security & compliance automation.
Posted: 09 Sep 2020 | Premiered: 03 Sep 2020


The State of Ransomware 2020
sponsored by Sophos
WHITE PAPER: Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.
Posted: 11 Sep 2020 | Published: 31 May 2020

Sophos

The Cost of Insider Threats: Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

IBM

Improving Online Customer Experience with Identity Management
sponsored by Okta
VIDEO: Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta
 
Browse by Report Type:
EPC White Papers | EPC Multimedia | EPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info