IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed   
Global Trading Identification Numbers Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Securing Remote Workers in the Age of Teleworking
sponsored by Infoblox
WHITE PAPER: Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Real-world SLAs and Availability Requirements
sponsored by Pure Storage
EBOOK: In this eguide, begin to understand the current state of end-users' deployments, evaluate the tolerance for downtime measured by downtime metrics, and identify organizations' availability technologies and methods.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Pure Storage

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 04 Mar 2021 | Published: 04 Mar 2021

Illumio

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

On-demand Demo: Oracle Communications Security Shield Cloud
sponsored by Oracle
VIDEO: In this video, learn about Oracle Communications Security Sheielf Cloud and the capabilities it can provide your organization.
Posted: 05 Apr 2021 | Premiered: 05 Apr 2021

Oracle

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

Vitens Moves to Cloud Security With BloxOne™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences