IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63Reports
 
Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA, The Security Division of EMC

Web Security: Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Cisco adds Sourcefire AMP to email, Web security
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This informative resource discusses a recent merger that brought together advanced malware protection for your email and web gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Unlock the Mystery of Effective Strategic Planning
sponsored by CA Technologies.
WHITE PAPER: This informative infographic illustrates four key tips to more effective planning, and introduces a project portfolio management (PPM) suite that gives you the capabilities and best practices you need to optimize PPM and make more strategic investments.
Posted: 15 Apr 2014 | Published: 31 Jan 2014

CA Technologies.

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

Redefining Defense-in-Depth
sponsored by Lumension
WHITE PAPER: This exclusive report examines how traditional protection solutions are decreasing in effectiveness and discusses a new defense-in-depth approach that can keep you endpoints safe from even the most malicious attackers.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement