IT Management  >   Systems Operations  >   Security  >  

Homeland Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: National Security, Public Safety
DEFINITION: A concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland Security White Papers (View All Report Types)
51 - 75 of 2234 Matches Previous Page  |  Next Page
5 Pillars for a Strong Cyber-Resilience Foundation
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

5 Steps for Migrating Your Legacy Apps to the Cloud
sponsored by Rackspace
WHITE PAPER: Explore this informative resource and learn how to migrate your legacy applications to the public cloud in just 5 easy steps.
Posted: 11 Nov 2014 | Published: 06 May 2014

Rackspace

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper lists 5 steps that your enterprise can take to guard your endpoints; reduce the complexity of assessments; lower administration costs; and achieve a compliant, secure environment.
Posted: 14 Jan 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

5 tactics to transition virtual desktop management to Tier 1 IT staff
sponsored by Unidesk Corporation
WHITE PAPER: Access this white paper to explore 5 strategies that IT teams are using to simplify VDI deployments to help alleviate day-to-day VM management and the complexity of virtual desktop environments.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Unidesk Corporation

5 Ways That MSPs Can Capitalize on Cloud Opportunities
sponsored by ConnectWise
WHITE PAPER: This insightful white paper details how MSPs can ensure the continued success of their businesses as the popularity of cloud computing continues to grow by offering the kind of indispensible personalized support to their clients that cloud giants can't provide.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

5 ½ Traits that make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper offers up five and half features that make a firewall next-generation.
Posted: 29 Jan 2015 | Published: 15 Dec 2014

Fortinet, Inc.

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

7 Common Cloud DLP Mistakes & How to Avoid Them
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper covers seven key mistakes you must avoid when taking your data loss prevention methods to the cloud.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

SkyHigh

7 Essential Steps to Securing Your Cloud Data
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

7 Key Trends in the Business of Tech
sponsored by K2
WHITE PAPER: This paper addresses 7 key trends in the business of tech today, from business acceleration to the consumerization of IT. Learn how you can capitalize on these trends with business application software that has 4 key capabilities.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

K2

7 reasons to Choose Anaplan to Replace your Planning Spreadsheets
sponsored by Anaplan
WHITE PAPER: This white paper introduces an alternative to planning spreadsheets that allows users to enjoy the immediacy and user-friendliness of spreadsheets and the security and scalability that comes with an enterprise solution. Read on for a list of seven benefits provided by this software.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Anaplan

7 Tips on Becoming an IT Service Broker
sponsored by Rackspace
WHITE PAPER: This exclusive whitepaper explores seven important tips for transforming IT into a service broker.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Rackspace

5 Secrets to SQL Server Availability
sponsored by Marathon Technologies
WHITE PAPER: The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Essential Tips to Ensure Success with RM
sponsored by Jama Software
WHITE PAPER: A company’s overall success largely relies on the software team’s success. Organizations that embrace this concept experience less frustration, fewer errors, and faster planning and development cycles. Read this guide to learn about seven essential tips to help you be more successful with requirements management and software development.
Posted: 08 Dec 2009 | Published: 18 Aug 2011

Jama Software

7 Keys to Success for Managing a Business-Critical Cloud with Confidence
sponsored by Hewlett-Packard Company
WHITE PAPER: Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running.
Posted: 01 May 2012 | Published: 26 Apr 2012

Hewlett-Packard Company

7 Stages Of Advanced Threats Cyber Attack Kill Chain
sponsored by Websense
WHITE PAPER: This important resource examines the seven stages of advanced threats, discussing in-depth how your organization can best protect itself and what tools are needed to keep your critical information safe.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Websense

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software
51 - 75 of 2234 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement