IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7Reports
 
How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

The 10-Minute Guide to Securing Email in the Cloud
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover a cloud encryption solution that caters to email security.
Posted: 23 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Electronics Retailer Reduces Order Fraud by 25% with iovation
sponsored by iovation, Inc.
WHITE PAPER: This case study zeros in on an electronics retailer who processes over four million online transactions, and combats fraud on a daily basis.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Three Steps to Securing Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

2014 Workplace Trends and Salary Guide
sponsored by Randstad
WHITE PAPER: Access this guide to get a look at the current state of business. You'll learn about the most challenging issues facing businesses today and get insight into how to handle them. You'll also explore salary trends specific to IT positions for geographic markets across the United States.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Randstad

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement