IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7White Papers (View All Report Types)
 
Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Eliminating the Challenge of Branch Office Recovery
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Riverbed Technology, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Evaluating Sync and Share Solutions: Balancing Security, Control and Productivity
sponsored by Code42
WHITE PAPER: Read this whitepaper to learn how to deploy the right OFS solution that gives IT control of security and productivity.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Three Reasons Why IT Efficiency is the Key to Your Hospital's Survival in the New Healthcare Economy
sponsored by RES Software
WHITE PAPER: The following white paper addresses the biggest pressures facing healthcare practices and provides insight into the top 3 reasons why IT efficiency is key to your hospitals survival in the new healthcare economy.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

The Cyber Resilience Blueprint: A New Perspective on Security
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Managed Security Services: When It's Time to Stop Going "It" Alone
sponsored by NEC Corporation of America
WHITE PAPER: Even if an organization is capable of the traditional, DIY integration of on-promise security solutions using in-house resources, is it truly any better than leveraging the expertise, scale and scope of a third-party service provider?
Posted: 15 Oct 2014 | Published: 15 Oct 2014

NEC Corporation of America
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement