IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
 
Navigating the Cloud for MSPS
sponsored by N-able Technologies
EGUIDE: In this E-Guide you will find the synopsis of a MSPAlliance webinar about security risks for your MSP.  Also included is a discussion of five cloud security issues facing MSPs.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

N-able Technologies

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

RaboBank's Journey from Agile to DevOps: Deliver Better Apps Faster, Without Compromises
sponsored by Perfecto Mobile
WEBCAST: In this webcast, watch as Rabobank, one of Europe's largest banks, shares how they transformed their mobile development team and practices to fully embrace DevOps.
Posted: 16 Apr 2015 | Premiered: Apr 6, 2015

Perfecto Mobile

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

EMM Challenges: Balancing the Needs of IT and End Users
sponsored by BlackBerry
WHITE PAPER: This white paper explains how you can start balancing IT needs with what employees want, without all of the complex infrastructures and security concerns you might expect. Read on to discover the 3 key features you should look for in an EMM strategy.
Posted: 16 Apr 2015 | Published: 26 Dec 2014

BlackBerry

Cloud Security Survey Report 2015
sponsored by CloudPassage
ANALYST REPORT: This comprehensive survey details what information security professionals believe is the current state of cloud security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

CloudPassage

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

The Dynamic IT Landscape of 2015
sponsored by Curvature
EGUIDE: Read this guide to learn how to integrate the newest enterprise IT concepts that will lower costs when adopting a new strategy.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Curvature

Bypassing Security Policies using Insufficient Authorization
sponsored by White Hat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 14 Apr 2015 | Premiered: Apr 14, 2015

White Hat Security

The Significance of Windows Server in a Changing IT Landscape
sponsored by Lenovo
EGUIDE: Access this expert e-guide to discover how the changing IT landscape is affecting the role of Microsoft Windows Servers within organizations. Find out how Microsoft is trying to integrate these new market trends by optimizing existing platforms to support cloud, mobile, and virtual machine environments.
Posted: 17 Apr 2015 | Published: 20 Mar 2015

Lenovo
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement