IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 White Papers (View All Report Types)
 
Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Learn How to Establish an ITAM Program in Less Than 30 Days
sponsored by BDNA
WHITE PAPER: This white paper focus' on a solution that offers a rapid way to get software, hardware and network asset data, cleanse it, and deliver an actionable inventory position. It helps your company prepare for their next inevitable audit and creates the actionable data necessary to build and support a growing ITAM practice within your organization.
Posted: 09 Nov 2016 | Published: 01 Oct 2016

BDNA

Rising IT Complexity Makes Remote Support Essential in Europe
sponsored by LogMeIn, Inc.
WHITE PAPER: Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

LogMeIn, Inc.

7 Ways to Simplify Security Intelligence so Your Team Can Work Smarter, Not Harder
sponsored by LogRhythm, Inc.
WHITE PAPER: With automated response, your analysts can review the situation before countermeasures are executed, while at the same time greatly reducing mean time to respond. In this resource, you'll uncover 7 best practices for getting security intelligence technology to work harder, so people can work smarter.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

LogRhythm, Inc.

Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers
sponsored by Bomgar Corp.
WHITE PAPER: Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Bomgar Corp.

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Entrust, Inc.

Security Overview: SSL/TLS Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Sync, Send and Receive: Why Cloud-Based Email and Storage Make Business Sense
sponsored by Microsoft
WHITE PAPER: Your business may not be enormous, but the amount of information you generate—even in one day—can be. Read on to discover how SMBs that adopt cloud-based email and storage will reduce their operational costs, increase productive collaboration with strategic use of IT staff, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement