Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

FISMA

RSS Feed   
DEFINITION: The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic Government Act of 2002.FISMA assigns responsibilities to various agencies to ensure the security of data in the federal government. The  … 

FISMA definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
FISMA Multimedia (View All Report Types)
 
Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 26 Feb 2020 | Premiered: Feb 19, 2020

TechTarget

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Active Directory Change Reporter Download - 20 Day Evaluation!
sponsored by Netwrix Corporation
TRIAL SOFTWARE: Download this 20 day evaluation version of the Active Directory Change Reporter.  This download includes both the standard and enterprise editions.  Just select between the Basic (standard) or Full-featured (Enterprise) modes in the setup wizard or in the Start Menu.
Posted: 20 Jul 2010 | Premiered: 20 Jul 2010

Netwrix Corporation

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Cycognito Video 1
sponsored by Cycognito
PRODUCT DEMO: Access this virtual demo for a closer look at the key features and capabilities of the CyCognito platform, designed to facilitate better security testing workflows through improved visibility of the attack surface, accelerated remediation processes, deeper insights into security trends, and more.
Posted: 01 Jun 2021 | Premiered: 01 Jun 2021

TOPICS:  Cybersecurity
Cycognito

Zero Trust for the Endpoint: Control the Conversation
sponsored by Illumio
VIDEO: Remote workspaces are here to stay – and organizations need to make deliberate efforts to address the associated risks. Access this conversation to learn how Zero Trust can be implemented to across endpoints to protect against ransomware and zero-day attacks.
Posted: 06 May 2021 | Premiered: 31 Dec 2020

TOPICS:  Cybersecurity
Illumio

The Vision Behind the CyCognito Platform
sponsored by Cycognito
VIDEO: Defending against modern cyberattacks requires organizations to think like a hacker – which is easier said than done. To address this, attack surface management (ASM) platforms have emerged across the security market. Watch this short video to hear about the benefits of ASM platforms and explore the key features of CyCognito’s ASM offering.
Posted: 27 May 2021 | Premiered: 27 May 2021

TOPICS:  Cybersecurity
Cycognito
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences