IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

HSPD 7

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 

HSPD 7 definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
HSPD 7 White Papers (View All Report Types)
151 - 175 of 3148 Matches Previous Page  |  Next Page
8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

8 Ways Legacy ERP Harms Businesses
sponsored by Oracle NetSuite
WHITE PAPER: Customizations acting like "silicon concrete" can harden legacy ERP against change and slow your business to a crawl. Cloud ERP can free businesses from the brittle, inflexible and change-resistant ERP of the past. Access this white paper to learn 8 ways legacy ERP harms businesses.
Posted: 14 Jul 2016 | Published: 31 Dec 2015

Oracle NetSuite

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

7 Ways the Best Hyperconvergence Is Like Your Smartphone
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Is branch IT a problem for your organization? Improve management by examining best practices in another area: devices.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article explores 7 steps to guard your network against rogue users. Read on to discover the unobtrusive measures you can take to catch and stop inside threats.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

8 Advantages of Disaster Recovery in the Cloud
sponsored by Druva Software
WHITE PAPER: Remove the costly management and burden of secondary data centers. Utilize the public cloud to realize these advantages.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

8 Questions You Should Ask About Linux Systems Management
sponsored by Red Hat and JBoss
WHITE PAPER: IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started.
Posted: 29 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

8 Strategies for Business Process Automation Success
sponsored by K2
WHITE PAPER: Choosing the right business process automation solution isn't easy. Evaluate platform quality across these 8 key areas.
Posted: 19 May 2016 | Published: 19 May 2016

TOPICS:  IT Management
K2

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

96% of Healthcare organizations have adopted cloud services. IT is struggling to keep up.
sponsored by McAfee, Inc.
WHITE PAPER: Healthcare organizations continue to turn to cloud solutions without IT involvement. Learn how to increase visibility.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

99% of financial organizations have adopted cloud, not all of it sanctioned by IT
sponsored by McAfee, Inc.
WHITE PAPER: Cloud adoption remains strong, but Shadow IT threatens security. Protect with an integrated security solution.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

A 15-Minute Guide to Collaborative Case Management
sponsored by EMC Corporation
WHITE PAPER: In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

EMC Corporation

A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Business Risk Approach to IT Governance
sponsored by IBM
WHITE PAPER: Learn best practices for assessing overall effectiveness in today's highly distributed organizations and how to manage IT risks. Also discover the role a centralized IT governance system can play in realizing your IT governance strategy.
Posted: 20 Jul 2016 | Published: 30 Sep 2011

IBM

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A CIO's Guide to Rethinking IT Service Management
sponsored by Cherwell
WHITE PAPER: Many CIOs have shifted focus from technical responsibilities to business strategy. Learn why ITSM cannot be overlooked.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

TOPICS:  IT Management
Cherwell

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Cloud Security Primer
sponsored by Intel Security
WHITE PAPER: Find out how to overcome security challenges, no matter what cloud model you deploy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A FIRST LOOK AT ORACLE BPM SUITE 11G
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation
151 - 175 of 3148 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement