IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Reports
 
A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

IT Service Management Blueprint – Get Control of Your Service Desk
sponsored by ServiceNow
WHITE PAPER: This white paper offers a blueprint that organizes the steps you need to take to get your help desk under control, while advancing service management delivery within your organization.
Posted: 21 Jul 2016 | Published: 08 Jan 2016

ServiceNow

Where Are You on the Road to Operational Intelligence
sponsored by Splunk
WHITE PAPER: Look to your IT infrastructure for the answer.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

TOPICS:  IT Management
Splunk

9 Ways Cybercriminals Can Compromise Business Communications
sponsored by MASERGY
RESOURCE: Learn 9 of the most serious threats to your VoIP devices and networks in order to fight off determined cybercriminals.
Posted: 14 Jul 2016 | Published: 27 Apr 2016

MASERGY

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

Migration Best Practices for Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.
Posted: 15 Jul 2016 | Published: 29 Aug 2014

Red Hat

Analyst Report: 8 Building Blocks to Ensure Successful Digital Transformations
sponsored by Gartner
WHITE PAPER: Discover the 8 essential building blocks of successful digital workplace initiatives in this Gartner report. Find recommendations for everything IT leaders need to enact digital change – from strategic planning to digital workplace technologies to consider.
Posted: 18 Jul 2016 | Published: 27 Feb 2015

Gartner

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Read on to discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement