IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7Reports
 
The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Take The Worry Out Of Patch Management: Shavlik Protect
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores the importance of broadening patch management beyond just focusing on your operating systems.
Posted: 10 Oct 2014 | Premiered: May 7, 2014

Shavlik Technologies

The Benefits of ITSM Principles
sponsored by CDW Corporation
EGUIDE: In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

CDW Corporation

Detect and Investigate Advanced Threats on Endpoints
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Find out how RSA ECAT (Enterprise Compromise Assessment Tool) helps organisations reduce attacker dwell time and the time it takes to detect and validate compromised machines, and much more.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

RSA, The Security Division of EMC

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by Bull
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

Bull

Private Cloud Considerations: Control and Confidence for Enterprise Teams (TechTarget)
sponsored by Code42
WHITE PAPER: Access this white paper to find out why an endpoint backup and cloud computing platform is right for organizations that are looking for the security of private clouds, but also need the control and cost efficiency of deploying the private cloud in an on-premises infrastructure.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement