IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 Reports
 
Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

Cisco Advanced Malware Protection for Networks
sponsored by Cisco
WHITE PAPER: This white paper shows you an advanced malware protection solution that detects, blocks, tracks and contains malware threats across multiple threat vectors.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will show you statics of cybercrime and give you tactics to proactively deter attackers.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Financial Sector Threats: 2015 Year in Review
sponsored by Digital Shadows
WHITE PAPER: In this white paper, you will read about threat activity in the financial sector as of 2015. It identifies new threats and includes public incidents of note such as extortion, malware and other sophisticated threats.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Insights for a New Chief Data Officer: Define Data Strategy and Align Business Goals
sponsored by IBM
EBOOK: In this e-book, specially designed for aspiring chief data officers (CDOs), discover how to collaborate, prioritize, and spearhead your organization's efforts to put data at the center of the business. Learn new CDO best practices and how you can better support strategic enterprise goals.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

IBM

Cybersecurity Buyers Guide
sponsored by Palo Alto Networks
WHITE PAPER: This white paper shows you how to keep up with the hackers and defend against all advanced threats. Read more to learn how to architect a cyber security solution that dynamically adapts to changing threats.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: In this eBook, you will read an in-depth examination of today's cyber threat landscape.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Modernize and Secure your Business
sponsored by Microsoft
WHITE PAPER: In this solution brief, you'll learn how modern businesses are meeting the expectations of workers to be able to work anywhere, anytime on virtually any device. Discover ways to manage devices and provide workers with secure access to the corporate data and apps they need.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement