IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63Reports
 
Private Cloud Considerations: Control and Confidence for Enterprise Teams (TechTarget)
sponsored by Code42
WHITE PAPER: Access this white paper to find out why an endpoint backup and cloud computing platform is right for organizations that are looking for the security of private clouds, but also need the control and cost efficiency of deploying the private cloud in an on-premises infrastructure.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

CW Buyer's Guide to Enterprise Collaboration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Implementing Cloud Solutions Within Your Existing IT Environment
sponsored by VMware, Inc.
WHITE PAPER: This paper demonstrates the extensibility capabilities of vCloud Automation Center and the skill set needed to allow IT personnel to enable, adapt, and extend their cloud to work within existing IT infrastructure and processes.
Posted: 14 Oct 2014 | Published: 31 Dec 2012

VMware, Inc.

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: As with many human endeavors, the impulse to automate the pen test is seemingly irresistible. But is it a good idea? This technical guide examines the pros, cons and unknowns of automated pen testing.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

NEC Biometrics Solutions Podcast: Enhancing the customer experience and securing endpoints
sponsored by NEC Corporation of America
PODCAST: This podcast reveals a biometrics solution that will help identify fraud across various industries. NEC's NeoFace uses a highly accurate, fast and flexible facial recognition tool for authentication purposes.
Posted: 10 Oct 2014 | Premiered: Oct 2, 2014

NEC Corporation of America

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Prolexic Quarterly Global DoS Attack Report
sponsored by Akamai Technologies
WHITE PAPER: The following case study intends to illustrate global view of security threats, vulnerabilities and trends surrounding DDoS attacks. In addition, it covers the feasibility of building botnets through the compromise of large installs of commonly used frameworks.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Reconciling Cloud And Security
sponsored by Scalr
WHITE PAPER: This white paper addresses the challenge that IT executives face consistently, an overview of the cloud landscape in terms of security, and a strategy that enterprises can use to safely adopt the cloud.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Scalr
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement