IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7White Papers (View All Report Types)
 
Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

Building the business case for continuity and resiliency
sponsored by IBM
WHITE PAPER: In this resource, discover what IT professionals are saying about IT risk management strategies and how you can add depth and breadth to your own business.
Posted: 25 Aug 2014 | Published: 30 Jan 2014

IBM

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM

Beyond next gen firewalls
sponsored by Dell Software
WHITE PAPER: This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Safety Through Synergy
sponsored by NEC Corporation of America
WHITE PAPER: Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

NEC Corporation of America

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement