IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland SecurityWhite Papers (View All Report Types)
51 - 75 of 1933 Matches Previous Page  | Next Page
7 Measures of Scalability for your Next-Generation Firewall (Gov)
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 24 Mar 2014 | Published: 23 Aug 2013

Dell Software

7 Ways to Tell if an Incident Response Service Provider is Right for You
sponsored by Dell SecureWorks UK
WHITE PAPER: View this white paper to learn more about how you can find the right incident response service provider. It outlines how to determine the vendor's capabilities and if the vendor represents the best fit based on your organizations unique needs.
Posted: 28 May 2013 | Published: 28 May 2013

Dell SecureWorks UK

8 Questions to Ask Your Intrusion Security System Vendor
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource outlines 8 questions to ask your intrusion security provider – to ensure your network stays protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2012

Hewlett-Packard Limited

8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 14 Jan 2014 | Published: 14 Jan 2014

Hewlett-Packard Company

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 07 Apr 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

A Framework for Developing and Evaluating Data Center Maintenance Programs
sponsored by Schneider Electric
WHITE PAPER: This white paper discusses the tiered infrastructure maintenance standard (TIMS), a straightforward method for easily evaluating the maturity of O&M programs to align everyone involved in the mission-critical environment.
Posted: 18 Jan 2013 | Published: 18 Jan 2012

Schneider Electric

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Limited

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Essential Tips to Ensure Success with RM
sponsored by Jama Software
WHITE PAPER: A company’s overall success largely relies on the software team’s success. Organizations that embrace this concept experience less frustration, fewer errors, and faster planning and development cycles. Read this guide to learn about seven essential tips to help you be more successful with requirements management and software development.
Posted: 08 Dec 2009 | Published: 18 Aug 2011

Jama Software

7 Keys to Success for Managing a Business-Critical Cloud with Confidence
sponsored by Hewlett-Packard Company
WHITE PAPER: Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running.
Posted: 01 May 2012 | Published: 26 Apr 2012

Hewlett-Packard Company

7 Stages Of Advanced Threats Cyber Attack Kill Chain
sponsored by Websense
WHITE PAPER: This important resource examines the seven stages of advanced threats, discussing in-depth how your organization can best protect itself and what tools are needed to keep your critical information safe.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Websense

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

7 Vital Tips for Video Meetings Sales Success
sponsored by IBM
WHITE PAPER: This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Posted: 24 Feb 2011 | Published: 29 Jan 2013

IBM

8 Questions You Should Ask About Linux Systems Management
sponsored by Red Hat and JBoss
WHITE PAPER: IT organizations are always looking for ways to save money and time without compromising on issues like security or compliance. Exploring the value of your systems management solution is a lot easier when you know the right questions to ask. We have a few suggestions for how to get started.
Posted: 29 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

A 15-Minute Guide to Collaborative Case Management
sponsored by EMC Corporation
WHITE PAPER: In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

EMC Corporation

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A FIRST LOOK AT ORACLE BPM SUITE 11G
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation
51 - 75 of 1933 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement