IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
51 - 75 of 3156 Matches Previous Page  |  Next Page
2017 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: Non-compliance fines for financial firms are piling up, growing 432% just last year from the year before. Learn how to ensure compliance for your financial organizations' growing number of communication channels.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

2017 Will be an Exciting Year for IT
sponsored by Splunk
WHITE PAPER: See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to explore the predictions for the IT field in 2017.
Posted: 18 Jan 2017 | Published: 31 Dec 2016

Splunk

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

4 Business Email Compromise Techniques and How to Stop Them
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how to protect your enterprise from business email compromise-style attacks. Uncover 4 common business email compromise techniques and how to mitigate the risk.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: Uncover 4 critical factors organizations should consider before designing their GRC deployment so that they can properly satisfy key use case needs, mitigate risks, and meet compliance regulations.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Rsam

4 Keys to More Effective CIO Succession Planning
sponsored by Infor
WHITE PAPER: Many companies face two dilemmas with respect to technology strategy—succession planning for retiring CIOs, and keeping up with the digital transformation of their industry. This white paper highlights the 4 keys to more effective CIO succession planning in the age of digital transformation.
Posted: 17 Oct 2016 | Published: 03 Oct 2016

Infor

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

2017 Outlook Report for Cloud Backup and Recovery
sponsored by Druva Software
WHITE PAPER: Cloud-based backup and recovery solutions offer cost savings without limiting data protection capabilities. Learn more.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva Software

22 Technical Considerations for Evaluating a Defragmentation Solution for Enterprise Workstations
sponsored by Diskeeper Corporation
WHITE PAPER: This paper compares the enterprise-targeted technologies in the Diskeeper performance software product line with the basic defragmentation solution offered in Windows’ more recent operating system releases. It outlines 22 considerations and solutions for defragmentation which is critical to the performance of every windows system.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Diskeeper Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Components in Securing the Software-Defined Data Center
sponsored by Intel Security
WHITE PAPER: The SDDC provides benefits for enterprise IT. Meet cloud security demands while expanding visibility and protection.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

3 File Transfer Mistakes that Could Be Costing You and Putting Data at Risk
sponsored by Globalscape
WHITE PAPER: IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Globalscape

3 Key Trends in IT Infrastructure
sponsored by Dimension Data
WHITE PAPER: Discover what IT and business leaders are saying about the future of their IT infrastructure.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

3 Keys to Choosing a Document Management Vendor
sponsored by OnBase by Hyland
WHITE PAPER: In document management, your choice of vendor is everything. Find out the three crucial steps to making the right pick.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Keys to Igniting Growth With Commerce in the Cloud
sponsored by Oracle Corporation
WHITE PAPER: E-commerce is crucial to your business success. Learn how to find the right partner for simple, sustained growth.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale

3 Steps to a Better Team of Architects, Developers and DBAs
sponsored by Dell EMC
WHITE PAPER: Your data pros have a huge impact on your entire organization. Learn how to enable world-class collaboration among them.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell EMC

3 Steps to Building a Successful ECM Project
sponsored by OnBase by Hyland
WHITE PAPER: You have a vision of an ECM project, but how do you get there? Find out the steps, from design to execution.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Findings on Managed Services for Workloads in the Cloud
sponsored by Dimension Data
WHITE PAPER: Learn why and how IT and business leaders are selecting managed services for production workloads in the cloud.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.
51 - 75 of 3156 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement