IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 
Definition continues below.
HSPD 7 White Papers (View All Report Types)
126 - 150 of 2492 Matches Previous Page  |  Next Page
A Practical Guide to Choosing the Right IT Systems
sponsored by Oracle & Intel
WHITE PAPER: In the following white paper, learn about the importance of choosing the right IT systems. Read on now and learn about the potential downfalls of choosing the inappropriate systems for your niche, where to turn for advice on the right systems, and more.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Oracle & Intel

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

A Simple Building Block for Software-Defined Data Center
sponsored by VMware
WHITE PAPER: Simplify your entire IT infrastructure lifecycle with EVO:RAIL
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TOPICS:  IT Management

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014


A Smarter Way to Create the Longitudinal Patient Record
sponsored by Hitachi Data Systems
WHITE PAPER: Access this strategy profile to discover the benefits and capabilities of a new paradigm in sharing, managing and connecting all clinical data anytime, anywhere.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

Hitachi Data Systems

A Unified Strategy for Cloud and Mobile Integration
sponsored by Oracle Corporation
WHITE PAPER: This publication introduces new features and capabilities in the areas of cloud, mobile, and IoT integration, in addition to managed file transfer (MFT). Access now to learn a cohesive approach to meeting pressing integration requirements.
Posted: 30 Sep 2015 | Published: 31 Dec 2014

Oracle Corporation

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

sponsored by Global Knowledge
WHITE PAPER: Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Global Knowledge

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013


A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013


A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013


A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014


A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014


A Unified Approach to Managing the Virtual Infrastructure
sponsored by Forsythe
WHITE PAPER: Managing the virtual infrastructure end-to-end is becoming more challenging as virtual environments continue to grow and more data center elements meld into the "cloud". This whitepaper will discuss the push for continued virtualization and the "cloud", and present you with questions that will help you create the best organizational strategy.
Posted: 23 Nov 2009 | Published: 23 Nov 2009


A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013


A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012


Aberdeen Report: Achieving Quality across the Global Manufacturing Network
sponsored by Infor
WHITE PAPER: Companies that are disciplined in managing the quality of their engineering, manufacturing, purchasing and human resource operations perform better. Read this white paper today to learn what strategic actions organizations can take to improve q...
Posted: 10 Nov 2006 | Published: 01 Dec 2005


Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett-Packard Company

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Limited
126 - 150 of 2492 Matches Previous Page    4 5 6 7 8 9    Next Page
HSPD 7 DEFINITION (continued): …  the September 11, 2001 attacks) was to require federal agencies to ensure the continuity and viability of physical and computer-based systems essential for minimal functioning of the U.S. government and economy in case of a terrorist attack. Under HSPD-7, federal departments and agencies are required to develop methods and technologies to protect all critical infrastructures and key resources of the government and economic sector. The primary intent of HSPD-7 is to prevent the exploitation, incapacitation, or destruction of these infrastructures and resources. However, a secondary goal is to foster … 
HSPD 7 definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement