IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Reports
 
A Strategic Partner for Proactive Security
sponsored by CrowdStrike
WHITE PAPER: This brochure explains how choosing the right security partner can help you thrive in today's dangerous cybercrime environment.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

Self Service – The 6 Most Important Success Factors
sponsored by USU AG
WHITE PAPER: Access this white paper for the six most important success factors of self-service. Learn how to empower your own customers with these self-service tips.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

USU AG

Healthcare Security: The Cost of Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: This white paper discusses the challenges of securing healthcare data in a mobile world, especially when mobile devices are lost or stolen.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

Absolute Software

Managing the Madness of Mobility
sponsored by Sprint
EBOOK: For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Sprint

Test Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

Traditional App Delivery Is Broken: Here's How You Can Fix It Now
sponsored by Mendix
WHITE PAPER: This guide outlines a new mindset and approach to help IT teams to deliver game-changing apps faster, easier, and cheaper than ever imagined. Read on to learn how to accelerate your time to market to position your company to lead this new app-driven economy.
Posted: 24 Jul 2015 | Published: 31 Dec 2014

Mendix

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: Access this white paper to get an in-depth look at the major mobile OS platforms, the security issues and features unique to each, and the measures IT needs to take to maintain control while encouraging productivity and mobility.
Posted: 03 Aug 2015 | Published: 30 Apr 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement