IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Reports
 
How SaaS Apps are Reshaping the Face of IT
sponsored by Matrix42
EGUIDE: In this e-guide, learn how to make mobile app dev platforms, management suites, and backup products work together. In addition, discover top tips for making SaaS integration an on-going IT priority.
Posted: 19 May 2015 | Published: 19 May 2015

Matrix42

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Simplify Saas and On-premises Integration
sponsored by Oracle Corporation
WEBCAST: Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.
Posted: 13 May 2015 | Premiered: May 19, 2014, 01:17 EDT (05:17 GMT)

Oracle Corporation

Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK: Examine crimeware, RAM scraping and advanced evasion techniques to learn how to defend systems, and investigate when defenses fail.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

The Keys to BYOD Security Success
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.
Posted: 18 May 2015 | Published: 18 May 2015

Dell, Inc. and Intel®

Case Study: How One Casino Boosted Backup
sponsored by Dell Software
CASE STUDY: Tape-based backup wastes IT resources. Learn how a new product slashed both backup and recovery times for one business.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell Software

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

How You Can Advance Your Enterprise with Hybrid IT
sponsored by Red Hat
WHITE PAPER: This white paper can help you take full advantage of hybrid IT and avoid any complications it may cause.
Posted: 08 May 2015 | Published: 08 May 2015

Red Hat

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 14 May 2015 | Published: 26 Dec 2014

IBM

Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement