IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
151 - 175 of 2941 Matches Previous Page  |  Next Page
A Next-Generation Analytics Platform for Optimizing Critical Application Operations in Virtualized Environments
sponsored by SIOS Technology Corp
WHITE PAPER: This white paper explores a next-generation IT analytics platform that is adaptable and scalable to meet the needs of IT departments in virtual environments. Access now and learn how this platform enables you to consolidate a variety of data sources into a single repository where it can apply advanced analytics.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

SIOS Technology Corp

A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER: This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

A Performance-Centric Approach to Mainframe Cost Optimization
sponsored by Global Technology Solutions Group
WHITE PAPER: When Global Technology Solutions Group, a company who spends a lot of time on the mainframe, was asked how to run it more efficiently from a cost perspective, they responded with their own approach. This white paper takes a brief look at that approach and its three key areas – hardware, software, and personnel.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Global Technology Solutions Group

A Practical Guide to Choosing the Right IT Systems
sponsored by Oracle, in association with Intel
WHITE PAPER: In the following white paper, learn about the importance of choosing the right IT systems. Read on now and learn about the potential downfalls of choosing the inappropriate systems for your niche, where to turn for advice on the right systems, and more.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Oracle, in association with Intel

A Prescription for Privacy
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

A Prescriptive Approach to Simpler, Faster and More Cost-Effective Project and Portfolio Management
sponsored by CA Technologies
WHITE PAPER: Learn how project and portfolio management (PPM) technologies, organizations can find smart, cost-effective ways to address market demands while balancing costs and driving more business value.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

A Seamless Path to the Hybrid Cloud
sponsored by F5 Networks
WHITE PAPER: Explore how you can couple Microsoft Azure's public cloud environment with secure networking controls to transition seamlessly to hybrid cloud. Learn about the security and networking benefits, and delve into several use case scenarios for deployment.
Posted: 09 May 2016 | Published: 09 May 2016

F5 Networks

A Secure, Highly Available Approach to the Distributed Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Despite its many benefits, the distributed enterprise poses several challenges for IT executives as they seek to provide corporate employees access to the applications and data they need in order to work effectively. Read this white paper to find out how it can be done with an included, intelligence approach to the distributed enterprise.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Dell, Inc. and Intel®

A Security Delivery Platform Benefits the Entire Organization
sponsored by Gigamon
WHITE PAPER: As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.
Posted: 09 Jun 2016 | Published: 09 Jun 2016

Gigamon

A Smart Way to Protect Windows Server 2003
sponsored by Unisys
WHITE PAPER: Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.
Posted: 13 Jun 2016 | Published: 30 Jun 2014

Unisys

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

A Software Defined Data Center Approach for a "Zero Trust" Security Strategy
sponsored by VMware
WHITE PAPER: Today, the software-defined data center (SDDC) is demonstrating a multitude of benefits beyond agility, speed, and efficiency. This white paper outlines the security capabilities made possible by an SDDC approach when used with the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: DoS attacks have grown, and now they target more businesses than ever. See how you can get a robust, affordable defense.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

TOPICS:  IT Management
Citrix

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

A SaaS-First Approach to Application Porfolio Management
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the virtues of SaaS for business operations and where the technology is headed.
Posted: 10 Oct 2013 | Published: 13 Oct 2011

BMC Software, Inc.

A Simple Building Block for Software-Defined Data Center
sponsored by VMware
WHITE PAPER: Simplify your entire IT infrastructure lifecycle with EVO:RAIL
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TOPICS:  IT Management
VMware

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Strategy for Ideal Branch Converged Infrastructure
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn how to handle siloed IT functions with an end-to-end strategy that delivers on IT priorities today and tomorrow.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.
151 - 175 of 2941 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement