IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
 
Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

API Security for Dummies
sponsored by Data Theorem
EBOOK: API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Data Theorem

Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Splunk IT Operations Predictions 2020
sponsored by Splunk
WHITE PAPER: Read through some of Splunk’s 2020 IT operations predictions – including increased AR/VR utilization, a renewed emphasis on UX design, AI integration, and more.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

How to Prevent Data Theft from Departing Employees
sponsored by ActivTrak
RESOURCE: When it comes to cybersecurity, many organizations look to bolster their defenses against external threats, while overlooking some of the internal threats posed by departing employees. In this article, uncover the 5 steps your organization should consider for protection from internal data theft.
Posted: 10 Dec 2019 | Published: 02 Dec 2019

ActivTrak

6 Best Practices to Improve Visibility and Accelerate Response
sponsored by ReliaQuest
WHITE PAPER: The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. In this white paper, learn how automation an simplify security and add content to threats and workflows.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

ReliaQuest

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Your Firewalls Are Dirtier Than You Think
sponsored by FireMon
DATA SHEET: Outdated firewall practices can leave vulnerabilities within your organizations network. These gaps can lead to security risks and underperformance. This infographic highlights the 4 steps for improving your firewall cleanup process. Read on to learn more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

FireMon

Veeam Brings Business Success for Havmor Ice Cream
sponsored by Veeam Software
CASE STUDY: Havmor implemented Veeam Backup & Replication and Veeam Agent for Microsoft Windows, resulting in 3 dramatically improved data availability benefits. To discover these 3 major benefits, read their case study here.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Veeam Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement