IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
 
Array Networks Case Study: SoftLayer, an IBM Company
sponsored by Array Networks
CASE STUDY: This case study reveals the results of Array Networks evaluation of SoftLayer's IaaS offering.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

Array Networks

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the headache of MDM and bring your company into the new age of mobility. View it now to see how your BYOD strategy can become simple, secure and cost effective.
Posted: 06 Jul 2015 | Premiered: 23 Mar 2015

IBM

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explores 6 tips to help future-proof your data center and 6 additional reasons to consider a completely new infrastructure approach. Read on to learn how you can evaluate vendors and get ready to meet the needs the modern data center.
Posted: 29 Jun 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Managing Tier 1 Applications in Today's Virtual Enterprise
sponsored by VMware
WHITE PAPER: In this eBook, take a look at what today's enterprise needs from an infrastructure management tool, and showcase the capabilities of VMware vCenter Operations Management.
Posted: 07 Jul 2015 | Published: 31 Dec 2014

VMware

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Explore this resource to discover tips, best practices, and a mobile device management solution to help you manage a multitude of different devices within your IT environment and how you can provide added flexibility to your workforce without sacrificing security. Read on now to find out more.
Posted: 06 Jul 2015 | Published: 28 Aug 2014

IBM

The CXO’s Guide to Managing Expansion... While Controlling Costs & Compliance Considerations
sponsored by Verizon
WHITE PAPER: This resource will help your executive level team get their IT infrastructure ready for expansion while remaining compliant and controlling cost.
Posted: 29 Jun 2015 | Published: 29 Jun 2015

Verizon

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement