IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7White Papers (View All Report Types)
 
Top Ten Reasons to choose Cloud-based Archiving
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this white paper to find out the top ten reasons to choose cloud-based archiving.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Hewlett-Packard Company

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

ITIL® 2015 and Beyond: Six Trends Driving the Increased Importance of the Service Desk
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Global Knowledge

Reputational Risk and IT in Utilities Industry
sponsored by IBM
WHITE PAPER: This white paper explores how security and business continuity strategies can shape the reputation and value of an organization. It also explains how organizations are shifting their risk strategies to meet new demands.
Posted: 27 Aug 2014 | Published: 31 Oct 2012

IBM

Putting mobile first: best practices in the financial services sector
sponsored by IBM
WHITE PAPER: Explore this in-depth resource to discover tips and best practices for optimizing your BYOD program and mobile infrastructure to meet the demands of the financial services sector. Read on now to find out more.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

IBM

Top 3 Reasons to Give Insiders a Unified Identity
sponsored by Centrify Corporation
WHITE PAPER: This white paper stresses the importance of recognizing the danger of malicious insiders and the potential for breaches caused by employee error or negligence, as well as the top 3 reasons to consider giving insiders a unified identity.
Posted: 20 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

A Guide to Disaster Recovery in the Cloud
sponsored by Avnet Technology Solutions
WHITE PAPER: Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Avnet Technology Solutions

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement