IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed   
Global Trading Identification Numbers Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

How Can We Integrate Security into DevOps and Infrastructure as Code Pipelines?
sponsored by Trend Micro
WHITE PAPER: As attack surfaces grow larger, it’s critical to incorporate security into every aspect of an organization. The emergence of DevSecOps enables the automation of security within the software development lifecycles, but implementation can be tricky. Download this white paper for recommendations and best practices.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Trend Micro

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Privacy Essentials for Security Professionals
sponsored by BigID
DATA SHEET: Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Cloud Security: The Optimal Response to Multi-Site Challenges
sponsored by Kaspersky Lab
CASE STUDY: In this case study, follow AMISEP, a community development association, as they partner with Kaspersky to implement Endpoint Security Cloud in order to unify, monitor and protect their growing number of distributed endpoints.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

Onshape Solves Their Biggest Monitoring Challenges with SignalFx
sponsored by Splunk
CASE STUDY: Onshape’s cloud-based 3D CAD systems are designed to facilitate collaboration across design teams from any device. In this quick video, learn how Onshape achieved these features and more by using SignalFx, earning real-time visibility into application and full-stack performance.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Splunk

When Internet Traffic Takes a Wrong Turn
sponsored by Farsight Security
RESOURCE: IP hijacking is an emerging cyberthreat in which hackers modify public routing tables in order to direct online traffic along the hijacked route towards the attacker’s network. To learn more about this threat, including how to mitigate it, download this infographic.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Farsight Security

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

Enhancing Security Automation
sponsored by TITUS
DATA SHEET: Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

TITUS
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info