IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 White Papers (View All Report Types)
 
Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015

Code42

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Password Management Evaluation Guide for Businesses
sponsored by Keeper Security Inc
WHITE PAPER: Learn the little-known reasons as to why passwords don't live up to their potential as security measures, how they cause data breaches, and how your organization can enhance its use of passwords to keep your data safe and secure.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Keeper Security Inc

Online Self-paced Learning - An idea whose time has come for India
sponsored by Pluralsight
WHITE PAPER: Access this white paper now to learn about this new e-learning platform and how it can integrate enterprise-grade analytics to provide employers with a granular view of who is learning what, where and how. Also, engage in some of the shifts observed after increasing self-paced e-learning is adopted for IT professionals.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

Pluralsight

A Guide To Growing The Perfect Employee
sponsored by Pluralsight
WHITE PAPER: This white paper explores how, with the right training, a good employee can be made into a great employee. Inside, gain tips to help you build a culture which fosters learning and growth. Plus, find out ways you can discover the right candidate, such as hiring for potential, looking at applicants' ability to adapt, and more.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Pluralsight

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Rising IT Complexity Makes Remote Support Essential in Europe
sponsored by LogMeIn, Inc.
WHITE PAPER: Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

LogMeIn, Inc.

Three Mistakes IT Makes That Could Cost Your Organization Millions
sponsored by Globalscape
WHITE PAPER: IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Globalscape

Protecting Smart Devices and Application Throughout the IoT Ecosystem
sponsored by PTC
WHITE PAPER: Discover new techniques and best practices for securing your network in today's hyper-connected environments. Following these best practices will make it possible to develop connected products that deliver real business value to your organization and its customers while protecting against intruders.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

PTC

Are You Leaving the Door Open for Cyber Threats?
sponsored by Palo Alto Networks
WHITE PAPER: In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement