IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
 
Take Control of the Cloud: How to Accelerate, Simplify, and Deliver
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this video to learn how to simplify application lifecycle management across multiple data centers, private clouds, managed private clouds, and public clouds. Additionally, discover how to deliver hybrid IT as a service, so that users get on-demand experiences, while IT gets governance, visibility, and control.
Posted: 07 Feb 2017 | Premiered: Dec 30, 2016

Cisco Systems, Inc.

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web
sponsored by Booz Allen Hamilton
WHITE PAPER: Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

Service Management for the Mobile Workforce
sponsored by Matrix42
WHITE PAPER: As mobile devices become the workplace norm, your IT department needs to figure out how to make enterprise mobility management (EMM) and IT service management (ITSM) work together. Access this white paper to learn how to plan your IT strategy around integrating modern mobility management and ITSM.
Posted: 16 Feb 2017 | Published: 30 Dec 2016

Matrix42

Modernize Cybersecurity with Hadoop Data Management and Analytics
sponsored by Cloudera
WHITE PAPER: Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

Cloudera

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Simplify and Accelerate Identity Protection on The Cloud
sponsored by IBM
WHITE PAPER: Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.
Posted: 10 Feb 2017 | Published: 30 Jun 2015

IBM

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement