IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
 
Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

ComputerWeekly.com

Detecting Security Anomalies with Machine Learning Analytics
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Report Your Way To A Better Customer Relationship
sponsored by N-able Technologies
EBOOK: This eBook explains how you can build and maintain great customer relationships with expert communication. Read more to learn about 3 different reports you can run regularly to ensure that you are doing everything you can to build customer satisfaction.
Posted: 24 Mar 2015 | Published: 20 Feb 2015

N-able Technologies

Focus on learning, not technology
sponsored by Dell, Inc.
CASE STUDY: Access this case study to find out how one school district opted for a virtualized desktop PC environment in the classrooms and take-home laptops for freshmen. Learn how implementing desktop virtualization via thin clients and a private cloud enabled them to ease IT data center management while optimizing access to learning resources.
Posted: 23 Mar 2015 | Published: 29 Nov 2013

Dell, Inc.

The Key to Unlocking Application Problems Lies in End User Response Time
sponsored by Fluke Networks.
WHITE PAPER: This exclusive white paper explains how network engineers who shift their focus to end user response times are positioning themselves to solve the problem of slow performance. Read more to learn how you can measure end user response times and start to conquer slow performance.
Posted: 24 Mar 2015 | Published: 06 Feb 2015

Fluke Networks.

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement