IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 White Papers (View All Report Types)
 
Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow

How to Quantify the Value of a Cloud Access Security Broker
sponsored by Palerra Inc.
WHITE PAPER: In this white paper uncover the reasons why Cloud Access Security Brokers are a crucial piece of any enterprise's security policy and how to make sure you're getting cloud security added into your budget.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Palerra Inc.

10 Reasons to Use Application and User Management Solution with VDI
sponsored by VMware
WHITE PAPER: Find out how you can take your virtual desktops to the next level with a unified application and user management solution that provides radically faster app delivery while reducing IT costs and explore the top 10 reasons to use this solution in your virtual environment.
Posted: 18 Aug 2016 | Published: 31 Dec 2015

VMware

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Ansible Tower in the Software Development Lifecycle
sponsored by Red Hat
WHITE PAPER: Discover the benefits Ansible Tower offers in the software development lifecycle (SDLC), and take advantage of its flexibility to embed it in existing tools and processes. Read on to centralize your infrastructure and SDLC management with a platform that will enable self-service and improve automated testing.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Red Hat

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Discover how the mobile threat landscape is changing as well as staying the same. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Juniper Networks, Inc.

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms
sponsored by Schneider Electric
WHITE PAPER: This informational white paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. Access this information now to evaluate the merits of remote monitoring vendors and their solutions.
Posted: 16 Aug 2016 | Published: 01 Aug 2016

Schneider Electric

Infrastructure as a Service: The Key to Innovation
sponsored by VMware
WHITE PAPER: Once orderly and predictable, the rulebook has been thrown out the window and it has become a mad dash for consumer attention in the business-to-consumer (B2C) marketplace. Legacy architectures are too slow making IaaS a smart choice. Access this white paper to learn strategies to get the most out of your IaaS.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

VMware

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement