IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 Reports
 
The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

How Top Managers Motivate & Energise Employees
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This white paper looks at how the top managers keep their teams motivated.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Citrix Online Go To Meeting

Assessing Mobile Maturity and Developing a Solid IT Model
sponsored by Good Technology
RESOURCE: In this white paper, you'll discover Gartner research into the key aspects of mobile maturity. Read on and learn how you can best evaluate your position in the mobile business world and create an appropriate IT model.
Posted: 18 Jun 2015 | Published: 30 Jun 2014

Good Technology

A Cyber Security Health Check
sponsored by SilverSky
WEBCAST: This informative webcast outlines how to make sure your healthcare cyber security is effective, and how to handle healthcare compliance.
Posted: 30 Jun 2015 | Premiered: Jun 30, 2015

SilverSky

IDC Case Study: Flying High on the Use of Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This white paper explains how UK-based organization Flybe, Europe's largest regional airline, was able to leverage Linux to revolutionize their IT support capabilities, creating new opportunities for innovation and revenue streams.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Red Hat

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Infographic: Windows vs RHEL TCO
sponsored by Red Hat
RESOURCE: The following infographic demonstrates the top 5 statistics why enterprises go with Linux when they need greater performance from their IT environment. Access now to learn more.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Red Hat

BYOD Security Strategies
sponsored by SHI International Corporation
EGUIDE: This e-guide presents expert advice on BYOD security strategies.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SHI International Corporation

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement