IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Reports
 
Red Hat, IBM and SAP: Collaborating on Bridging the Intelligent Enterprise with a Cloud-Native Future
sponsored by Red Hat
WHITE PAPER: As new developments emerge in the cloud, companies are starting to realize that open, flexible solutions are needed to ensure their IT architecture can deal with whatever change the future brings. Read on to learn how Red Hat is partnering with IBM and SAP to create open, consistent development experiences across VMs, containers, and more.
Posted: 16 Oct 2020 | Published: 25 Jun 2020

Red Hat

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?
sponsored by Bitdefender
RESOURCE: The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.
Posted: 23 Oct 2020 | Published: 21 Oct 2020

Bitdefender

How to Optimize Cloud Operations for the Best User Experience
sponsored by Cisco
WHITE PAPER: This paper explains how today's enterprise cloud represents a complex digital landscape and how the more applications, technologies, and vendors, the greater the complexity and additional busines risk.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

TOPICS:  IT Management
Cisco

HPE Infosight Security For HPE Storage
sponsored by TechData
WHITE PAPER: Access this white paper to learn how HPE InfoSight can help build the self-managing storage infrastructure of the future through 5 key features.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

TechData

Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs
sponsored by Dell SecureWorks
WHITE PAPER: Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.
Posted: 19 Oct 2020 | Published: 31 May 2020

Dell SecureWorks

Top 10 Security Events to Monitor in Azure AD and Office 365
sponsored by Quest
EBOOK: Microsoft reports that 95 million active directory (AD) accounts are the target of cyberattack each day, and 1.2 million Azure AD accounts are compromised each month. To avoid breaches, you must keep an eye on changes to roles, groups, applications and more. Read this e-book to learn the top 10 events that Azure AD and O365 admins track closely.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Quest

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

How to Improve ROI and Operational Efficiency for Cybersecurity
sponsored by Vectra AI
PRODUCT OVERVIEW: The effects of the cybersecurity skills gap are most prominent when it comes to threat detection and response – teams are overworked by the sheer volume of alerts, not to mention the effort it takes to flag and isolate threats before it’s too late. Read this white paper for an overview of Vectra’s AI offering, which aims to remedy this gap.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Operational Cost, Security-Related Risk: Quantifying The Value Of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increases security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info