IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed   
Global Trading Identification Numbers Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

9 Best Practices for Preventing Alert Storm
sponsored by LogicMonitor
WHITE PAPER: In many circumstances, less can be more. When it comes to IT alerting strategies, this mantra absolutely rings true. Inside this guide, uncover the nine things you can do to avoid unnecessary alert storms and proactively prevent system failures
Posted: 16 Mar 2020 | Published: 16 Mar 2020

LogicMonitor

CyberArk Global Advanced Threat Landscape 2019 Report
sponsored by CyberArk Software, Inc
WHITE PAPER: The cyberattack landscape is constantly changing: Hackers use more complex tactics for bypassing security methods, leading to organizations revising their security programs with advanced tools. This CyberArk Global Advance Threat Landscape Report highlights some of the key trends and challenges from 2019. Read on to uncover the results.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

CyberArk Software, Inc

Morphisec Allows Citizens Medical Center to Focus on Saving Lives
sponsored by Morphisec, Inc.
CASE STUDY: In this case study, follow the journey of Citizens Medical Center, a hospital in Texas, as they partner with Morphisec to address the endpoint security needs of their increasingly distributed environment while overcoming challenges related to budgetary constraints and access to talent. Download now to learn more.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Morphisec, Inc.

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: As organizations continue to use cloud HR tools, like Workday, to realize the benefits of cloud, they often are still faced with manual challenges related to onboarding and access control. This video highlights the features and capabilities of SailPoint’s integration with Workday, designed to address this issue. Watch now to learn more.
Posted: 16 Mar 2020 | Premiered: 16 Mar 2020

SailPoint Technologies

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Like most security tools, identity governance and administration (IGA) is under pressure to provide cloud-based services to meet customer need. In this Magic Quadrant report, Gartner evaluates key IGA offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 19 Mar 2020 | Published: 09 Oct 2019

SailPoint Technologies

The Third Annual Study on the State of Endpoint Security Risk
sponsored by Morphisec, Inc.
WHITE PAPER: In this year’s annual study into the state of endpoint security risks take a closer look at the perception endpoint security, current trends, tactics and statistics. One noteworthy finding from the study is that 68% of respondents reported one or more attacks in 2019 that resulted in a compromised endpoint. Read on to unlock the full report.
Posted: 17 Mar 2020 | Published: 31 Jan 2020

Morphisec, Inc.

How to Recognize and Resist Common Email Cons
sponsored by Trustwave
RESOURCE: The frequency and success of phishing attacks is increasing at an alarming rate. Just when organizations believe they understand how to spot an attempt, hackers come up with new ways to infect inboxes. This infographic outlines how to spot a phishing attack by looking at emerging tactics and how to spot them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info