IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7Reports
 
Improve the Confidence in Your Big Data with IBM InfoSphere
sponsored by IBM
WHITE PAPER: This informative white paper discusses how organizations can use information governance to improve the confidence in big data.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

The Anatomy of an Anonymous Attack
sponsored by Imperva
RESOURCE: This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®

Multi-Layered Security
sponsored by GFI Cloud
WHITE PAPER: Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Posted: 14 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

Cloud Breaks IT: How a Broker Platform Can Help IT Harness the Power of Cloud
sponsored by Gravitant
WEBCAST: This exclusive webcast details how the cloud is not as easy, fast and cheap as people assume and offers cloud service brokerage as an important tool.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Gravitant

Accessing Your Cloud Risk
sponsored by Sophos, Inc.
WEBCAST: This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.
Posted: 18 Jul 2014 | Premiered: Jul 10, 2014

Sophos, Inc.

Webcast: Why Conventional Security Tools Fail in Modern Data Centers
sponsored by CDW Corporation
WEBCAST: This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Posted: 21 Jul 2014 | Premiered: Jun 17, 2014

CDW Corporation

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This paper explains how, by integrating an extensive set of network and application-layer protection mechanisms, Citrix® NetScaler® can provide advanced access and action control capabilities, deep visibility for rapid trouble shooting and a wealth of additional service delivery features.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Web Application Firewalls: Patching, SDLC Key for Security Compliance
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement