IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
101 - 125 of 3223 Matches Previous Page  |  Next Page
5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

5 Key Benefits of Securing Your Cloud with CASB
sponsored by Cisco Cloudlock
WHITE PAPER: Keep your cloud secure. Discover 5 key components that your CASB should have to ensure your organization's safety in the cloud.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec & Blue Coat Systems

5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

5 Steps to Improve Your Cyber Security Incident Response Plan
sponsored by IBM Resilient
WHITE PAPER: Having an incident response plan can positively impact the cost of a data breach. Access this white paper to learn five steps to assess and improve your existing incident response plan – or write a brand new one.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

IBM Resilient

5 Steps to Quantifying Insider Risk
sponsored by Veriato, Inc.
WHITE PAPER: Security is a matter of numbers: vague alerts like "we are at risk" do little for the security professional tackling the issue at hand. Learn 4 "insider risk laws", 5 steps to quantifying and addressing insider risk, and more.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

5 Steps to Take Backup from Good to Great
sponsored by SolarWinds, Inc.
WHITE PAPER: Faulty or inefficient backup strategies and technology can hamper your business dramatically. Access this resource to discover 5 steps to improve your backup strategy today.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

SolarWinds, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett Packard Enterprise

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and Intel®

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

5 Reasons to Choose Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Don't fall behind. Invest in converged infrastructure and profit from these five benefits.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 Reasons to Choose Hyper-Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Excel in today's digital economy and drive business results with HCI. Discover five reasons to adopt.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 reasons why your data center is everywhere
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: In the following white paper, uncover the inherent nature of modern applications and learn how you must address your data center infrastructure to ensure your application operations are as effective and valuable as they should be. Access now to learn more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 steps to aligning IT to the needs of your organization
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: Read this white paper to uncover the five steps you can take to align your IT to the needs of your organization. Inside, uncover how to develop a vision, leverage cloud to facilitate alignment, and much more.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Strategies to Transform Sales and Marketing Processes
sponsored by K2
WHITE PAPER: Increase revenue and improve customer self-service by transforming the top 5 sales and marketing processes.
Posted: 19 May 2016 | Published: 19 May 2016

TOPICS:  IT Management
K2

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

5 tips to ensure that big data has a big impact on your organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn five tips to get more actionable insight from your data and find out how you can ensure that big data has a big impact on your business.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Cisco Systems, Inc.

5 Tips to Improve Sales Performance
sponsored by Oracle Corporation
WHITE PAPER: From strategies to analysis, learn what top companies are doing in this modern best practices guide.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation
101 - 125 of 3223 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement