IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 
Definition continues below.
HSPD 7 Reports
151 - 175 of 4680 Matches Previous Page  |  Next Page
A framework to Surface Cyber Threats via Security
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

A Guide to Hyper-Converged Infrastructures Purpose-Built for Zero Branch IT
sponsored by Riverbed Technology, Inc.
DATA SHEET: This data sheet explains how to converge server, storage, and network infrastructure to enable data centralization, instant recovery, and lower TCO. Read on to advantage of this hyper-converged infrastructure.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Riverbed Technology, Inc.

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by
EGUIDE: In this expert E-Guide from, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

A guide to multi-layered web security
sponsored by Akamai
ESSENTIAL GUIDE: This essential guide details threats common to websites and web applications and what you can do to mitigate them. Read on to learn more.
Posted: 18 Aug 2015 | Published: 31 Dec 2014


A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


A Guide to Server Managed Services and Integrated Managed Infrastructure
sponsored by IBM
WHITE PAPER: In this guide, you will discover how to leverage outsourced server platform management to increase your server operational efficiency. Access this guide now to drive down infrastructure management costs using virtualization and cloud monitoring.
Posted: 13 Nov 2015 | Published: 31 Dec 2014


A Holistic Data Security Approach for Financial Organizations
sponsored by Raytheon|Websense
WHITE PAPER: This white paper discusses how a financial institution can stay secure in today's dangerous threat environment.
Posted: 09 Sep 2015 | Published: 30 Jun 2015


A Modern Approach to Multi-Tenancy
sponsored by AlienVault
WHITE PAPER: This white paper outlines an alternative to Multi-Tenancy that won't cause technical and business limitations. Read on to learn about the business benefits Federation.
Posted: 13 Nov 2015 | Published: 13 Nov 2015


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

A New Approach to Endpoint Security
sponsored by Webroot
WHITE PAPER: Access this white paper to learn how you can take a new approach to security that provides unmatched protection for your devices and those of your customers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


A New Approach to Staying Connected in the Changing Meeting Environment
sponsored by Polycom, Inc.
WHITE PAPER: This white paper serves as a guide for employing and enhancing video collaboration in your organization, and examines how you can create a fast paced, nimble, highly collaborative work environment.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Enterprise

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

A Heuristic Approach to Mobile Security
sponsored by Zenprise
WHITE PAPER: This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.
Posted: 20 Oct 2011 | Published: 20 Oct 2011


A Management Tool that Will Empower you with a Proactive Approach
sponsored by VMware, Inc.
WHITE PAPER: This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business.
Posted: 26 Sep 2013 | Published: 26 Sep 2012

VMware, Inc.

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Sophos, Inc.

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by Intel Security
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

Intel Security

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

151 - 175 of 4680 Matches Previous Page    5 6 7 8 9 10    Next Page
HSPD 7 DEFINITION (continued): …  the September 11, 2001 attacks) was to require federal agencies to ensure the continuity and viability of physical and computer-based systems essential for minimal functioning of the U.S. government and economy in case of a terrorist attack. Under HSPD-7, federal departments and agencies are required to develop methods and technologies to protect all critical infrastructures and key resources of the government and economic sector. The primary intent of HSPD-7 is to prevent the exploitation, incapacitation, or destruction of these infrastructures and resources. However, a secondary goal is to foster … 
HSPD 7 definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement