IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63Reports
 
Carving a path through IaaS security with CloudPassage
sponsored by CloudPassage
WHITE PAPER: Access this white paper to find out about one comprehensive solution that employs threat intelligence within the cloud and uses behavioral analysis to detect anomalies. Don't leave your cloud infrastructure at risk.
Posted: 05 Sep 2014 | Published: 21 Apr 2014

CloudPassage

Threat-Aware Identity and Access Management for Mobile, Cloud, and Enterprise
sponsored by IBM
WHITE PAPER: This informative white paper presents new identity and access management (IAM) solutions with integrated threat prevention and analysis, increased granularity, and simplified user interfaces and dashboards.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

IBM

HP TippingPoint – A New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: HP TippingPoint complements anti-virus defenses with a three-prong approach that detects and disrupts the malware lifecycle.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Hewlett-Packard Company

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PRESENTATION TRANSCRIPT: This expert resource discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dyn

Best Practices Guide for IT Governance & Compliance
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover three critical steps for maintaining compliance with external regulations and internal security policies.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

Dell, Inc.

Best Practices in Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This expert research report looks at the best practices for preparing your IT environment for mobile initiatives and provides a step-by-step approach for mobile and security specialists.
Posted: 09 Sep 2014 | Published: 04 Feb 2014

Citrix

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement