IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7Reports
 
Orchestration Simplifies and Streamlines Virtual and Cloud Data Center Management
sponsored by IBM
WHITE PAPER: Access this white paper to examine how advanced automation and orchestration solutions are helping IT data center operations teams effectively manage increasingly complex enterprise computing environments. It also looks at a new solution that is addressing emerging IT management priorities.
Posted: 12 Dec 2014 | Published: 31 Jan 2013

IBM

Dell HPC: Intelligent Light accelerates research 20X
sponsored by Dell, Inc.
WHITE PAPER: This case study examines how one organization was able to keep up with growing computational fluid dynamics data by leveraging a solution that delivers cloud-based access to dedicated nodes on a Linux based cluster of next level servers. Read on to learn how this approach delivers faster access to high-performance computing resources and more.
Posted: 12 Dec 2014 | Published: 29 Feb 2012

Dell, Inc.

Customer Use Case: JMAC Lending
sponsored by Quest Systems
CASE STUDY: Explore how desktop-as-a-service enabled an organization to align all of its virtualization efforts in order to support a flexible work environment from anywhere, on any device while keeping applications and data secure.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

Quest Systems

FierceIT eBook Network Security Now
sponsored by Hewlett-Packard Company
WHITE PAPER: In this FierceITSecurity eBook, IT and networking professionals will find practical, real-world advice on how to handle network security now.
Posted: 11 Dec 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Examining the converged architecture solutions
sponsored by Presidio Network Solutions
EGUIDE: Access this white paper to explore why converged infrastructures are gaining popularity and a comparison of different converged infrastructure options and the benefits they can provide.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Presidio Network Solutions

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 11 Dec 2014 | Published: 30 Dec 2013

Hewlett-Packard Company

Introduction to the Vectra X-series user interface
sponsored by Vectra Networks
WEBCAST: In this webcast from Enterprise Strategy Group, analysts study how the Vectra X-series platform - an inside-the-network cyber attack detection and reporting platform uses machine learning and data science to identify network behavior to identify each phase of the attack lifecycle.  Read on to learn more
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

Vectra Networks

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

Next-Generation Colocation: Examine the Technologies and Trends that are Changing the Landscape
sponsored by Internap
WHITE PAPER: This white paper examines technologies and trends that are changing the colocation landscape and providing valuable benefits. Read on to learn how you can determine which technologies can help you better serve your end users and drive operational efficiencies. You'll also get tips for finding the right colocation provider.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Internap

3 Ways That Retailers Can Address POS Security Challenges
sponsored by Bit9, Inc.
VIDEO: In this short video, learn how to address evolving malware threats and meet PCI DSS 3.0 compliance requirements with a proactive approach to security.
Posted: 15 Dec 2014 | Premiered: 07 Nov 2014

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement