IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 White Papers (View All Report Types)
10 Do's and Don'ts When Migrating to the Cloud
sponsored by Leaseweb
WHITE PAPER: In this white paper, learn 5 things you should be doing to prepare for your cloud migration, like sharing your roadmap with your teams and checking the compliance certifications of your partner, as well as 5 things you should certainly avoid like abandoning your current investments or planning to migrate in one big move.
Posted: 21 Feb 2018 | Published: 21 Feb 2018


The Business Value of Red Hat CloudForms
sponsored by Red Hat
WHITE PAPER: This report highlights a vendor-agnostic platform for self-service provisioning and workload life-cycle management across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Download now to learn how to use this tool to deliver services with agility across your entire ecosystem.
Posted: 08 Feb 2018 | Published: 31 Oct 2017

Red Hat

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

3 Reasons Why DevOps is a Game-Changer for Security
sponsored by Tenable, Inc.
WHITE PAPER: Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Hybrid Cloud Technology for Business Leaders
sponsored by Leaseweb
WHITE PAPER: This white paper outlines how you can move to a hybrid cloud environment, and the tangible benefits you can gain by doing so.
Posted: 21 Feb 2018 | Published: 21 Feb 2018


Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


Secure SD-WAN: Integrated NGFW Security with WAN Transformation
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to unlock how to secure your SD-WAN network infrastructure with NGFW security.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Fortinet, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement