IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 Reports
 
Best Practices for the Next-Generation Data Centre
sponsored by Dimension Data
WHITE PAPER: In the following article, explore and consider some of the emerging best practices that organizations are adopting to ensure that their journey to the next-generation data center remains on track, and learn what it take to keep yours on the right path as well.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Dimension Data

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: This report uses survey results and IT leaders' insights to discuss what's keeping businesses from embracing IT innovation, and what can be done to get around these barriers.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Dimension Data

Guide to Bimodal IT Strategy: Leveraging Traditional & Cloud-Based Apps
sponsored by Red Hat
WHITE PAPER: This e-book will instruct IT leaders on creating a bimodal infrastructure strategy that will enable you to support both traditional and new cloud-based agile IT applications. Read on to see how you can leverage the key benefits.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Red Hat

Cyber Security Intelligence for 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015.
Posted: 04 Sep 2015 | Published: 31 Aug 2015

IBM

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Performance Reviews of 7 Next-Gen IPS Tools
sponsored by IBM
WHITE PAPER: This Gartner report looks at leading the next-generation IPS tools, giving detailed reviews on seven of the best.
Posted: 01 Sep 2015 | Published: 29 Dec 2014

IBM

Endpoint Protection for Today's Threats
sponsored by Webroot
WHITE PAPER: This white paper introduces a new endpoint security technology that takes up less space on your devices while blocking more advanced threats.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Webroot

Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Improve IT Agility and Efficiency: An Analysis of Large Data Brings Fresh Insights into Operation
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how real-time, historical, and embedded search analytics are helping IT pinpoint massive amounts of data to find and resolve problems faster.
Posted: 28 Aug 2015 | Published: 28 Feb 2014

IBM

The Top 10 Considerations in Choosing an Enterprise Collaboration Too
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper provides 10 considerations that could help make your organization's transition to mobility simpler. Read on to further explore the process of adopting a secure collaboration platform.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement