IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Reports
 
The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

Solution Brief: Real-Time Deep Memory Inspection
sponsored by SonicWall
PRODUCT REVIEW: Learn about SonicWall Real-Time Deep Memory Inspection technology and how it can catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

SonicWall

Aeris and ROAMWORKS: Protecting Cargo from Security Challenges
sponsored by Aeris
CASE STUDY: To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Aeris

Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor
sponsored by ALTR
PRODUCT OVERVIEW: Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

Welcome to the Future of Cyber Security: Top 5 Cloud Security Challenges
sponsored by Checkpoint Software Technologies
WHITE PAPER: Businesses are rapidly migrating workloads and data to public cloud environments to improve efficiencies, drive innovation and increase responsiveness to market conditions. While the cloud provides numerous benefits there are also some rather unique security challenges. In this white paper, explore the top 5 security challenges in the public cloud.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Checkpoint Software Technologies

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
PODCAST: In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

ITSM and Digital Transformation – Where Are We?
sponsored by Serviceaide
WEBCAST: Hear from ITSM and IT automation experts as they discuss the impending evolution of ITSM under the pressures of digital transformation – and how technology like AI, machine learning, and process automation will become crucial to a successful IT service strategy.
Posted: 17 Jun 2019 | Premiered: Nov 27, 2018

Serviceaide

Modernize Your Legacy IT With Predictive Analytics
sponsored by Splunk
WHITE PAPER: Every business is a technology business, and IT departments are essential to delivering a growing number of services that their legacy systems cannot properly support. Read this white paper to learn how to modernize your legacy IT systems with predictive analytics to keep the lifeblood of you organization agile and responsive.
Posted: 31 May 2019 | Published: 31 Dec 2018

Splunk

PCI Network Security Compliance For Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: PCI DSS requires proper monitoring at the network level. The challenge with traditional network monitoring tools is that they generate inaccurate data for Kubernetes. In this white paper, learn how Tigera supports continuous PCI compliance that gives teams the ability to pinpoint any point in time and say with certainty if they were in compliance.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement