IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63Reports
 
Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Are you Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Find out how you can utilize the technologies of today to create new business opportunities and prepare for the future of IT.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Cisco Systems, Inc.

How to Safely Avoid Overcooling Your Data Center and Save Money Today
sponsored by Raritan Inc.
WHITE PAPER: Explore this in-depth whitepaper to discover how you can improve your data center efficiency without sacrificing uptime.
Posted: 17 Jul 2014 | Published: 31 Dec 2013

Raritan Inc.

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

What is an IT-as-a-Service Catalog and Why is it a Necessity?
sponsored by Gravitant
WEBCAST: This webcast details the importance of and effective service catalog in the cloud that can combat the need for shadow IT.
Posted: 21 Jul 2014 | Premiered: Jul 21, 2014

Gravitant

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and IntelĀ®

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

At Last, Profitable Endpoint Security for MSPs
sponsored by Webroot
WHITE PAPER: This white paper introduces one company's cloud-driven, cost-effective solution to the challenges that MSPs have long faced when it comes to providing endpoint security services.
Posted: 18 Jul 2014 | Published: 31 Oct 2013

Webroot

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement