IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Reports
 
Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can make sure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

How to Deal With a Perfect Storm of Disruption in the Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper features expert advice about what companies in the managed services industry should do to prepare for transformational change in IT.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 16 Jul 2015 | Published: 28 Feb 2014

Cisco Systems, Inc.

Putting the Kibosh on Shadow IT: Best Practices for Hybrid Cloud Management
sponsored by XO Communications
WHITE PAPER: This resource discusses the best ways to implement a hybrid cloud in such a way as to prevent departments from going behind the IT department's back to implement cloud services.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

XO Communications

Modernize Your Backups for Modern Data Volumes
sponsored by IBM
VIDEO: This brief video discusses how an effective storage management platform can not only simplify your storage, but enhance data backup and protection as well.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

IBM

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Video Beyond the Boardroom: 4 Steps to Improving Call Quality
sponsored by Vyopta
EBOOK: Does your organization enjoy the benefits of video conferencing and video collaboration? With increased use of these resources, your IT team probably has a much bigger challenge of managing mobile devices. This eBook reviews the fundamentals of new video conferencing call quality metrics.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Vyopta

Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement