IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland SecurityWhite Papers (View All Report Types)
126 - 150 of 2427 Matches Previous Page  | Next Page
A New Era of IT
sponsored by Information Builders
WHITE PAPER: This resource explores how combining the right business intelligence (BI) platform with an expert integrated system will allow you to reorient and optimize IT practices for cloud computing, resulting in better performance, scalability, reliability, and more.
Posted: 02 May 2013 | Published: 31 Dec 2012

Information Builders

A New Set of Network Security Challenges
sponsored by Dell Software
WHITE PAPER: This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

A Prescription for IT Efficiency
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Dell, Inc. and Windows 8 Pro

A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

IBM

A Simple Way to Connect and Manage Computing in the Data Center
sponsored by CISCO & INTEL®
WHITE PAPER: Access this white paper to learn how you can provide an exceptionally easy, intelligent, and efficient way to connect and manage computing in the data center.
Posted: 30 Sep 2014 | Published: 30 Aug 2013

CISCO & INTEL®

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Defining Your Cloud Services Catalog
sponsored by VMware
WHITE PAPER: This exclusive whitepaper will show you why you need a cloud services catalog and walk you through how to build one.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

VMware

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A Tale of Two Workloads
sponsored by Rackspace
WHITE PAPER: Explore this informative resource to learn about one possible solution that you can leverage with existing VMware vSphere to build a hybrid cloud infrastructure for your organization. Read on now to learn more.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

Rackspace

A Unified Model for Describing a Project Plan
sponsored by Global Knowledge
WHITE PAPER: This paper proposes a unifying model for project plans. A distinction will be made between the outputs of project planning and the project plan itself. The significance of this distinction is to allow projects of all types to be described at a high level, in a common language, regardless of the type of analysis used to develop the plan.
Posted: 29 Jul 2013 | Published: 05 Jun 2013

Global Knowledge

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

A New Charter for HR
sponsored by Jive Software
WHITE PAPER: In this white paper, Stowe Boyd of GigaOM Research explores:The current state of the workforce: What is the new normal? How HR and technology leaders can work together to responsibly invest in social technologies? What HR must become to embrace the modern workplace and earn a seat at the executive table.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Jive Software

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Unified Approach to Managing the Virtual Infrastructure
sponsored by Forsythe
WHITE PAPER: Managing the virtual infrastructure end-to-end is becoming more challenging as virtual environments continue to grow and more data center elements meld into the "cloud". This whitepaper will discuss the push for continued virtualization and the "cloud", and present you with questions that will help you create the best organizational strategy.
Posted: 23 Nov 2009 | Published: 23 Nov 2009

Forsythe
126 - 150 of 2427 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement