IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 White Papers (View All Report Types)
How to Migrate Your Data Center Worry-Free
sponsored by Flexential
WHITE PAPER: Data center migration isn't a possibility, it's an eventuality. In this white paper, learn what events could act as catalysts for a migration, as well as 7 steps to make sure it goes as smoothly as possible. Then evaluate if you can handle a migration on your own, or if finding a partner would be the smart choice.
Posted: 08 Mar 2018 | Published: 08 Mar 2018


The Truth About Cloud Contact Center Security
sponsored by West UC
WHITE PAPER: For the modern contact center, security is still the biggest barrier to adoption of a cloud-based strategy. To ease your concerns, this white paper debunks 5 common network security myths and helps you build a secure cloud contact center.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

West UC

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


How to Design and Maintain a Secure ICS Network
sponsored by SecurityMatters
WHITE PAPER: Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.
Posted: 12 Feb 2018 | Published: 16 Jul 2015


How the Cloud Enables Digital Transformation
sponsored by Microsoft
WHITE PAPER: Download this white paper to discover how the cloud empowers organizations of all sizes to more effectively bring together people, data, and processes. See how the cloud can help your organization enhance communication, security, and productivity.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Aggregate, Protect, Share: Technologies to Help Health IT Protect and Manage
sponsored by IBM
WHITE PAPER: Security breaches in healthcare organizations are climbing. Inside, discover why healthcare organizations must implement more comprehensive, integrated security solutions to stay compliant, and how using a single data protection infrastructure can protect data from security breaches.
Posted: 01 Mar 2018 | Published: 30 Nov 2017


Why Leading CISOs are Adopting a Strategy-First Approach to IAM
sponsored by Edgile
WHITE PAPER: How should a CISO prioritize which problem to attack first? With security breaches dominating the headlines, CISOs must decide where to begin when defending security incidents. This resource explains the benefits of a strategy-first approach to IAM.
Posted: 29 Jan 2018 | Published: 29 Jan 2018


Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Why ISO/IEC 27001 Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: Access this white paper to learn how privileged access management is critical to ISO/IEC 27001 compliance to establish, implement, maintain, assess and continually improve a robust information security management system (ISMS).
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

The Business Value of Red Hat CloudForms
sponsored by Red Hat
WHITE PAPER: This report highlights a vendor-agnostic platform for self-service provisioning and workload life-cycle management across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Download now to learn how to use this tool to deliver services with agility across your entire ecosystem.
Posted: 08 Feb 2018 | Published: 31 Oct 2017

Red Hat

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement