IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed   
Homeland Security Presidential Directive 7 Reports
 
Simplify and Secure all Privileged Access with Agentless MFA
sponsored by Silverfort
PRODUCT OVERVIEW: With all privileged accounts and assets centrally managed by the CyberArk Privileged Access Security solution, it's critical to ensure that only authorized users can access and utilize them. Download this solution brief to learn about the benefits of Silverfort and CyberArk integration today.
Posted: 21 May 2019 | Published: 21 May 2019

Silverfort

Global Online Payments Company Implements MFA for Sensitive Systems
sponsored by Silverfort
CASE STUDY: In this case study, find out how Silverfort enabled BlueSnap to comply with the PCI DSS by securing remote and privileged access with MFA and auditing all user access across the organization.
Posted: 22 May 2019 | Published: 22 May 2019

Silverfort

How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE: To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

What to Look for in a CASB
sponsored by Forcepoint
VIDEO: You need a CASB, but there are so many products to choose from. So what features should you actually care about? Find out in this short video.
Posted: 24 May 2019 | Premiered: 24 May 2019

Forcepoint

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

2018 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Verizon published its report on payment card security and compliance with the PCI DSS. Download the report now for a deep-dive into the specifics of what organizations find challenging about PCI DSS, the lessons learned from decades of dealing with compliance, and how to build a more sustainable security environment.
Posted: 22 May 2019 | Published: 22 May 2019

Verizon

TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


MicroScope – June 2019: Sourcing IT among the clouds
sponsored by MicroScope
EZINE: Outsourcing is changing as the anything-as-a-service model takes off.
Posted: 24 May 2019 | Published: 24 May 2019

MicroScope

How Do You Really Put AI to Work for ITOps?
sponsored by BMC
WHITE PAPER: Find out how machine data and AIOps platforms are helping encumbered IT teams make sense out of the intricacies of modern infrastructure and applications – finding patterns, diagnosing problems, and even predicting future changes.
Posted: 20 May 2019 | Published: 20 May 2019

BMC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement