IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Reports
 
IT Optimization: Optimal across the Organization
sponsored by TeamQuest Corporation
RESOURCE: This concise infographic lays out the business benefits of IT optimization. Explore each advantage as they pertain to multiple departments, from IT staff to business executives.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

TeamQuest Corporation

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Ensuring Desktop Virtualization Success
sponsored by VMware
WHITE PAPER: This white paper can provide you with all the essential information you need to know before deploying VDI in your organization.
Posted: 30 Jun 2015 | Published: 31 Dec 2012

VMware

Applying IT Service Management Best Practices To Mobile
sponsored by Good Technology
WHITE PAPER: Access this white paper to discover the keys to mobilizing your ITSM approach to ensure the success of your mobile business initiatives.
Posted: 18 Jun 2015 | Published: 30 Sep 2014

Good Technology

Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

The Internet of Things: A Primer for the Curious
sponsored by Global Knowledge
WHITE PAPER: View this white paper to learn what the Internet of Things means, some key vertical markets where it can affect the most short-term change, the impact on existing networks, and much more.
Posted: 17 Jun 2015 | Published: 08 Apr 2014

Global Knowledge

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine what a data breach will cost your organization.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement