IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
101 - 125 of 2674 Matches Previous Page  |  Next Page
A Closer Look at The Next-Gen Data Center
sponsored by IBM
WHITE PAPER: This white paper examines the benefits of implementing a next-gen data center. Learn how moving from a manually administered infrastructure to an automated, workload-aware infrastructure can have a dramatic impact on IT cost, risk and quality of service.
Posted: 27 Aug 2014 | Published: 31 May 2014

IBM

A Dynamic, Integrated System Designed to Disrupt the Lifecycle of Advanced Attacks and Help Prevent Loss
sponsored by IBM
WHITE PAPER: In this white paper, learn how you can stay ahead of advanced threats by leveraging an integrated system that can disrupt the entire lifecycle of an attack, evolve to prevent new threats, and more. Additionally, explore the ways one threat protection system can address today's most pressing security concerns.
Posted: 16 Feb 2016 | Published: 30 Jun 2015

IBM

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

A Guide to Innovating the Infrastructure of Your Financial Services Institution
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this resource, you will discover a model for guiding your financial services business, step by step, through technology adoption dilemmas, and it also outlines the opportunities presented by mobility, big data, and cloud computing.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Hewlett-Packard Enterprise

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

A Guide to Server Managed Services and Integrated Infrastructure
sponsored by IBM
WHITE PAPER: In this guide, you will discover how to leverage outsourced server platform management to increase efficiency across your entire data center, and drive down infrastructure management costs by using virtualization and cloud monitoring.
Posted: 13 Nov 2015 | Published: 31 Dec 2014

IBM

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A FIRST LOOK AT ORACLE BPM SUITE 11G
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Enterprise

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

A Heuristic Approach to Mobile Security
sponsored by Zenprise
WHITE PAPER: This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.
Posted: 20 Oct 2011 | Published: 20 Oct 2011

Zenprise

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

A Management Tool that Will Empower you with a Proactive Approach
sponsored by VMware, Inc.
WHITE PAPER: This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business.
Posted: 26 Sep 2013 | Published: 26 Sep 2012

VMware, Inc.

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Sophos, Inc.

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation
101 - 125 of 2674 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement