IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7Reports
 
Mobile Device Management in Minutes
sponsored by IBM
VIDEO: This video gives walkthrough of an intuitive portal that allows organizations to manage your devices, apps, and docs in minutes.
Posted: 14 Aug 2014 | Premiered: 14 Aug 2014

IBM

Application Portfolio Management: Treat Software as a Valuable Asset
sponsored by Innotas
EGUIDE: This e-guide explains how application portfolio management (APM) allows organizations to oversee the applications that run their business, helping to ensure efficient and accurate inventory.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Innotas

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

Mobile Security for IT Departments
sponsored by LabTech Software
EBOOK: From smartphones to tablets, as the popularity of mobile devices grows, the opportunity for security breaches grows as well, placing a new burden on IT departments. Download your free eBook to learn how you can ensure your organization remains protected from mobile security threats.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

LabTech Software

Case Study: How a Global Bank Addressed App Security and Lowered Costs
sponsored by Veracode, Inc.
CASE STUDY: A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Veracode, Inc.

Managed File Transfer: Business Users Need Visibility
sponsored by IBM
WHITE PAPER: End-users are striving to enable collaboration and integrate as many business processes as possible, and in our information-driven society, managed file transfer (MFT) is tied closely with achievement of critcal business objectives.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains the challenges regarding Web security, and explores a solution with a durable network-based security architecture that is designed to protect against malicious threats.
Posted: 21 Aug 2014 | Published: 01 May 2013

Cisco Systems, Inc.

What to look for when evaluating NGFW
sponsored by Dell Software
WHITE PAPER: This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Build and Manage a Hybrid Cloud
sponsored by Egenera
WEBCAST: Watch this informative webcast to get insight on the future of hybrid clouds and the opportunities and challenges associated with it. As you watch, you'll also find out how to design and manage a hybrid environment for your organization.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

Egenera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement