IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 
Definition continues below.
HSPD 7 Reports
226 - 250 of 4712 Matches Previous Page  |  Next Page
Accelerate the Development and Performance of Your Applications
sponsored by Red Hat
PRODUCT OVERVIEW: This resource explores how updated middleware infrastructure can enable your enterprise to accelerate the development and performance of applications; integrate diverse applications, data, and devices; automate business processes and decisions; and more.
Posted: 13 Apr 2015 | Published: 14 Jun 2013

Red Hat

Accelerated Mentoring for Openstack Architecture
sponsored by Red Hat
WHITE PAPER: This white paper details a mentoring-based delivery model for closing the operational gap when implementing OpenStack into your data center.
Posted: 07 Oct 2014 | Published: 06 Aug 2014

Red Hat

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: This report uses survey results and IT leaders' insights to discuss what's keeping businesses from embracing IT innovation, and what can be done to get around these barriers.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Dimension Data

Accelerating Digital Marketing
sponsored by
ESSENTIAL GUIDE: This study from CEB debunks the myths over the relationship between CIOs and CMOs and shows how CIOs can play a critical role in accelerating digital marketing.
Posted: 30 May 2014 | Published: 30 May 2014

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Accelerating Virtual SAN With SSDs
sponsored by Micron Technology
WHITE PAPER: The latest VSANs scale-up with hardware-agnostic direct-attached storage. Learn how they easily boost performance.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

TOPICS:  IT Management
Micron Technology

Accenture Technology Vision 2012
sponsored by
IT BRIEFING: Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Access your step-by-step guide to CISSP Certification
sponsored by TechTarget
RESOURCE: Obtaining your CISSP certification is globally recognized as a standard of achievement for security professionals, but earning and maintaining your status takes work. Gain access to our helpful CISSP guide when you complete our brief Authentication & Authorization Survey.
Posted: 18 Mar 2014 | Published: 18 Mar 2014


Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell, Inc.
EBOOK: Discover a next-generation firewall solution that combats emerging threats effectively and without compromise while reducing the total cost of ownership (TCO). Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell, Inc.

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Achieve Global PCI DSS Compliance with Managed Cloud Services
sponsored by Datapipe
CASE STUDY: This case study examines how Gateway Ticketing Systems was able to upgrade to a fully managed, PCI compliant hosting environment. Read on to see how this particular cloud platform can deliver business growth enabled with scalable, secure, redundant network, and more.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Achieve Immediate Value from your ITSM Investment, Without the Hassle
sponsored by Unisys
WHITE PAPER: This white paper offers the information you need to install, manage, maintain and optimize your ITSM application management investment. Learn how to achieve the lowest possible total cost of ownership and the highest level of availability.
Posted: 26 Aug 2015 | Published: 30 Jun 2015


Accelerate the delivery of modern applications
sponsored by Hewlett Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 28 Dec 2011 | Published: 30 Sep 2011

Hewlett Packard Enterprise

Accelerate the delivery of modern applications
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: An IT modernization project will be unique to your business, and to successfully manage it you'll need the appropriate tools, resources, and best practices throughout the process. Read this paper to get a framework for initiating your modernization efforts.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Hewlett-Packard Enterprise

Accelerate Windows 7 Migration with User Virtualization
sponsored by AppSense
WHITE PAPER: The Microsoft workstyle is changing. The old desktop computer is being replaced by the digital generation and fast-paced, tech-savvy devices. Access this resource to learn about the new Microsoft workstyle, which promotes anywhere connection, intelligent infrastructure, cloud management and multiple Windows-based devices.
Posted: 03 Oct 2012 | Published: 01 Feb 2012


Accelerate Your Windows Server 2003 Migration
sponsored by HP
WHITE PAPER: Support for Windows Server 2003 is ending. Read why flexible plans can help you be sure you make the best transition.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

TOPICS:  IT Management

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: Executives are frustrated with slow deployment of new tech. Learn why they should use new metrics to speed growth.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

TOPICS:  IT Management
Dimension Data

Accelerating Design With Virtual Workspaces
sponsored by NVIDIA/VMware
WHITE PAPER: Architecture firm BLDD needed lower costs and better collaboration. Find out how they got just that through modern VDI.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

TOPICS:  IT Management

Accellion raises the bar in secure cloud-based file sharing
sponsored by Accellion, Inc.
WHITE PAPER: The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
Posted: 25 Jun 2013 | Published: 04 Dec 2012

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Access Accounts More Securely with Intel® Identity Protection Technology
sponsored by Intel
PRODUCT OVERVIEW: This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them.
Posted: 03 Aug 2011 | Published: 02 Aug 2011


Access Control in Virtual Environments
sponsored by FoxT
WHITE PAPER: The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources.
Posted: 16 Jun 2008 | Published: 16 Jun 2008


Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

226 - 250 of 4712 Matches Previous Page    8 9 10 11 12 13    Next Page
HSPD 7 DEFINITION (continued): …  the September 11, 2001 attacks) was to require federal agencies to ensure the continuity and viability of physical and computer-based systems essential for minimal functioning of the U.S. government and economy in case of a terrorist attack. Under HSPD-7, federal departments and agencies are required to develop methods and technologies to protect all critical infrastructures and key resources of the government and economic sector. The primary intent of HSPD-7 is to prevent the exploitation, incapacitation, or destruction of these infrastructures and resources. However, a secondary goal is to foster … 
HSPD 7 definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement