IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 
Definition continues below.
HSPD 7 Reports
176 - 200 of 5247 Matches Previous Page  |  Next Page
A Computer Weekly Buyer's Guide to Access Control
sponsored by
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

A Computer Weekly buyer's guide to CIO leadership
sponsored by
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
Posted: 28 Jan 2016 | Published: 26 Jan 2016

A Computer Weekly buyer's guide to operational IT
sponsored by
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 06 Sep 2016 | Published: 30 Aug 2016

A Convergence of Interest and Products
sponsored by
EBOOK: Previously unattainable due to its high cost, converged infrastructure is on the cusp of its watershed moment. Recognizing its long term benefits, organizations must analyze the biggest benefits and key cautions about moving to a converged platform. This white paper aids you in this process. Read on to learn more.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

A Dynamic, Integrated System Designed to Disrupt the Lifecycle of Advanced Attacks and Help Prevent Loss
sponsored by IBM
WHITE PAPER: In this white paper, learn how you can stay ahead of advanced threats by leveraging an integrated system that can disrupt the entire lifecycle of an attack, evolve to prevent new threats, and more. Additionally, explore the ways one threat protection system can address today's most pressing security concerns.
Posted: 16 Feb 2016 | Published: 30 Jun 2015


A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by
EGUIDE: In this expert E-Guide from, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

A Guide to Private Cloud Security
sponsored by Intel Security
WHITE PAPER: Find out how to successfully deploy a private cloud that maximizes protection and minimizes risk.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

A Guide to Protecting Your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on to learn how to protect assets by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015


A Guide to Safely Adopting Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012


A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

A Computer Weekly buyer's guide to log management
sponsored by
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

A Computer Weekly Buyer's Guide to Value-Added IT Advice
sponsored by
EBOOK: In this 12-page buyer's guide, Computer Weekly looks at the changing position of the CIO and how there are more people in the role from less technical backgrounds than in the past; who a CIO should call when she or he needs advice.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

TOPICS:  CIOs | IT Management

sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Enterprise

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

A Guide to Hyper-Converged Infrastructures Purpose-Built for Zero Branch IT
sponsored by Riverbed Technology, Inc.
DATA SHEET: This data sheet explains how to converge server, storage, and network infrastructure to enable data centralization, instant recovery, and lower TCO. Read on to advantage of this hyper-converged infrastructure.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Riverbed Technology, Inc.

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

A Heuristic Approach to Mobile Security
sponsored by Zenprise
WHITE PAPER: This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.
Posted: 20 Oct 2011 | Published: 20 Oct 2011


A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems
176 - 200 of 5247 Matches Previous Page    6 7 8 9 10 11    Next Page
HSPD 7 DEFINITION (continued): …  the September 11, 2001 attacks) was to require federal agencies to ensure the continuity and viability of physical and computer-based systems essential for minimal functioning of the U.S. government and economy in case of a terrorist attack. Under HSPD-7, federal departments and agencies are required to develop methods and technologies to protect all critical infrastructures and key resources of the government and economic sector. The primary intent of HSPD-7 is to prevent the exploitation, incapacitation, or destruction of these infrastructures and resources. However, a secondary goal is to foster … 
HSPD 7 definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement