IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63Reports
 
Simplified Third-Party Patching for Microsoft System Center with Shavlik
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores a solution that expands Microsoft System Center Configuration Manager's patching capabilities to cover third-party applications.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Shavlik Technologies

Under Siege From Web Threats:APAC Countries Respond In Patchwork and Tardy Fashion
sponsored by Akamai Technologies
WHITE PAPER: Access the following white report to examine some of the toughest security challenges facing organizations today including insight into how to avoid performance-robbing practices being used by far-too-many companies.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

OpenStack: The Platform of Choice for Cloud
sponsored by Red Hat
WHITE PAPER: This infographic is the outcome of an IDG Connect survey of 200 US enterprise decision makers that includes adoption plans for OpenStack, the platform of choice for private cloud development and deployment.
Posted: 17 Oct 2014 | Published: 06 Jun 2014

Red Hat

Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: As with many human endeavors, the impulse to automate the pen test is seemingly irresistible. But is it a good idea? This technical guide examines the pros, cons and unknowns of automated pen testing.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Your Data has Left the Building; What are You Doing to Protect it?
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

Vulnerability Management: What you Need to Know to Prioritize Risk
sponsored by AlienVault
WEBCAST: This exclusive webcast covers the importance of prioritizing your vulnerabilities.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

Efficacy of Emerging Network Security Technologies
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper provides an in-depth look at network security technologies and their true benefit and role in the network. Read on to learn more.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement