IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7White Papers (View All Report Types)
 
Time for a New Colocation Provider? 5 Ways to Know for Sure
sponsored by Iron Mountain
WHITE PAPER: Your data center colocation choices are of the utmost importance. The wrong choice can put you at risk of downtime, exceeding capacity, unsuccessful disaster recovery, or regulatory noncompliance. Access this resource to learn the 5 ways to know if it's time to search for a new colocation provider.
Posted: 21 Oct 2014 | Published: 20 Oct 2014

Iron Mountain

Enhanced Monitoring for VMware Infrastructure
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how you can deliver enhanced monitoring for your VMware infrastructure. You'll learn how this solution delivers pervasive visibility for monitoring, analysis, and security tools into the virtual environment and private cloud.
Posted: 23 Oct 2014 | Published: 30 Jun 2014

Gigamon

A Guide To Multi-Layered Web Security
sponsored by Akamai Technologies
WHITE PAPER: Unfortunately, multilayered web security is not as straightforward as businesses would like, which makes thwarting security attacks like the Heartbleed virus even more stressful. So what does it take to do it? Consult this guide to uncover the strategies and technology needed to deploy a powerful, multilayered web security project.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

What is an Identity Provider (IdP), and Why Do I Need One?
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Information-Driven Security and RSA Security Analytics and RSA ECAT
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn how RSA Security Analytics 10.4 and RSA ECAT 4.0 integrate into an end-to-end enterprise security analytics architecture to help anchor information-driven security initiatives.
Posted: 23 Oct 2014 | Published: 24 Sep 2014

RSA, The Security Division of EMC

Quick Wins with Website Protection Services
sponsored by Akamai Technologies
WHITE PAPER: The following white paper examines the current state of website security and demonstrates the all-too-common error of neglecting security in this realm. Additionally, lean about a website protection solution that can quickly add measurable security to your web presence with a price for enticing than deploying an in-house solution.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Go Beyond SIEM with RSA Security Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Today's security information and event management (SIEM) solutions aren't able to spot attacks and are far too slow to provide useful information. Learn how RSA Security Analytics can help.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

RSA, The Security Division of EMC

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Should IT Users be Treated like Patients?
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

5 New Laws of Antimalware Protection: Keep Up with Evolving Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive whitepaper offers up five new laws you must know in order to protect your organization from ever-evolving malware threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement