IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
26 - 50 of 2510 Matches Previous Page  |  Next Page
2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015


2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015


2015 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download the report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


2015 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your copy ofthe eighth annual Global Knowledge IT Skills and Salary Survey to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for, and much more.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Global Knowledge

2015 Report: Profiling Infrastructure Leaders
sponsored by Hewlett-Packard Company
WHITE PAPER: This report, based on findings from a December 2014 through January 2015 survey, examines who can be considered the leaders, mainstream players and laggards in modern digital asset management by taking a close look at the most successful (and least successful) management practices. Learn where today's organizations stand.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

2015 State of DevOps Report
sponsored by Puppet Labs
WHITE PAPER: The following DevOps report confirms that IT performance can provide real business value. Read on and learn IT's role in delivering an optimal DevOps transformation by employing best practices and avoiding pain points.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

Puppet Labs

2015 State of the Sysadmin Report
sponsored by Opsview Inc
WHITE PAPER: According to a recent survey, system administrators (sysadmins) know that they're important, but many feel that aren't valued by their co-workers. This report reveals the full results and contains key advice that will help sysadmins move up the ladder and command a higher salary increase.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Opsview Inc

2015 Technology and Talent Development Report: The IT Manager View
sponsored by Cisco Systems, Inc.
WHITE PAPER: Many IT managers are reporting a shortage in skilled job candidates. It's clear that there's never been a better time to get the inside edge on how you can propel your IT career, or break into the IT industry. Get your free copy of the 2015 Technology and Talent Development Report: The IT Manager view now to learn more.
Posted: 18 Sep 2015 | Published: 31 Aug 2015

Cisco Systems, Inc.

3 Essential Components for a Strong End User Security Strategy
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.
Posted: 06 Oct 2015 | Published: 30 Nov 2014

Dell, Inc. and Intel®

4 Critical Steps for IT Uptime, Security, and Connectivity
sponsored by CyrusOne
WHITE PAPER: To accommodate customer demands, increasing amounts of data, and changing regulations, your business needs to stay ahead of the curve. This white paper explores how colocation can help you do just that, with high levels of network flexibility and security.
Posted: 12 Mar 2015 | Published: 12 Mar 2015


4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014


4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014


2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013


2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013


2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014


22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013


3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014


4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

26 - 50 of 2510 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement