IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
When and Where Is the Public Willing to Provide Biometric Information?
sponsored by Unisys
WHITE PAPER: This infographic discusses how the public feels about using biometric security information, including when and where they think it is appropriate.
Posted: 28 Sep 2015 | Published: 28 Sep 2015


Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


DLP Benefits for Enterprises and Intellectual Property Protection
sponsored by Digital Guardian
EGUIDE: This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

Digital Guardian

The Importance of Operational Excellence for IT Service Providers
sponsored by Datapipe
WHITE PAPER: In the following white paper, learn how managed IT services providers can help IT decision makers free up their time to focus on important processes that move the business forward. Read on to uncover what characteristics are necessary to have in a MSP that can provide trustworthy and valuable services for years to come.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


How to Keep Your Public Cloud Private
sponsored by HyTrust
PODCAST: This podcast discusses how you can ensure data protection, security, and compliance in the public cloud. Listen in to learn how you can begin enjoying the benefits of the public cloud without fear.
Posted: 29 Sep 2015 | Premiered: Sep 22, 2015


Why Partnering with the Right People is a Necessity for Channel Programs
sponsored by Schneider Electric
WEBCAST: In the following webcast, learn about the importance of partnering with an effective IT services provider and uncover where you can turn for help in deciding which partner is right for your business. Access now and ensure that your business runs smoothly, even in the wake of new IT pressures like the third platform.
Posted: 30 Sep 2015 | Premiered: Sep 22, 2015

Schneider Electric

Security Report: Are Your Customers Afraid to Share Data?
sponsored by Unisys
WHITE PAPER: In this report, survey results from the Australian public reveal how much consumers fear sharing their personal data and which industries they distrust the most.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Platform simplifies access to virtual desktops
sponsored by Imprivata
WHITE PAPER: This white paper uncovers a platform extending the benefits of desktop virtualization by streamlining access to remote workstations. Download now to find out the impact this platform has on improving virtual desktops.
Posted: 24 Sep 2015 | Published: 29 May 2015


Best Practices for Web Application Security
sponsored by WhiteHat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 01 Oct 2015 | Published: 06 May 2015

WhiteHat Security

Vendor Assessment of Wired and Wireless LAN Access Infrastructure
sponsored by Hewlett-Packard Company
RESEARCH CONTENT: This research paper evaluates enterprise LAN vendors who provide converged access layer connectivity.
Posted: 07 Oct 2015 | Published: 02 Sep 2015

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement