IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7Reports
 
Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA, The Security Division of EMC

Endpoint Security Compliance: Top 19 Questions Auditors Ask
sponsored by Lumension
WEBCAST: This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Posted: 11 Apr 2014 | Premiered: Apr 11, 2014

Lumension

E-Guide: Mistakes to Avoid to Ensure a Successful ITSM Program
sponsored by ServiceNow
EGUIDE: This expert e-guide covers three crucial mistakes you must avoid for IT service management implementation and details how one company made ITSM fun.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ServiceNow

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
WHITE PAPER: This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
sponsored by EMC Corporation
WHITE PAPER: To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Posted: 11 Apr 2014 | Published: 30 Sep 2012

EMC Corporation

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

How CIOs drive innovation and create value across the enterprise
sponsored by ComputerWeekly.com
BOOK: Today's CIO is uniquely positioned to lead innovation and drive transformation across the modern enterprise, says Hunter Miller, in this extract from his book, Leading The Epic Revolution.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

The Total Economic Impact Of Silver Tail Systems
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this in-depth white paper, Forrester Consulting examines the total economic impact that enterprises may realize by deploying Silver Tail Systems Forensics software.
Posted: 14 Apr 2014 | Published: 31 Aug 2012

RSA, The Security Division of EMC

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

SearchSecurity.com

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement