IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
Understanding Human Behavior to Reduce Risk
sponsored by Forcepoint
WEBCAST: New technologies have changed the way we interact with our data and rendered the old threat-centric security model obsolete. It has also made it much harder to identify good and bad behavior leading to an ambiguous "gray space". In this webcast, learn how adopting a human-centric approach can give IT visibility into the gray space and reduce risk.
Posted: 14 May 2019 | Premiered: May 14, 2019


Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018


Experian Identity and Fraud Report
sponsored by Experian
WHITE PAPER: While businesses strive to unlock the benefits of increasingly digital lifestyles, a growing sophistication in cyberattacks and fraud has decreased consumer trust. Read this research report to learn how to maintain consumer trust in an increasingly digital era.
Posted: 09 May 2019 | Published: 31 Dec 2018


A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

TechTarget Top Cloud Security Considerations for SAP Users
sponsored by Google
WHITE PAPER: Google Cloud helps SAP customers build, deploy and operate securely at internet scale. SAP users are currently looking to migrate from legacy SAP versions to the company's flagship S/4HANA platform, and do so in the cloud. Download this white paper now to see how Google Cloud addresses every security consideration that SAP users have to tackle.
Posted: 10 May 2019 | Published: 10 May 2019


The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019


TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019


California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Top 5 Ways HR and IT Can Partner on Delivering Great Employee Experiences
sponsored by ServiceNow
WHITE PAPER: Download this white paper to uncover5 ways to partner across HR and IT to foster a transformative mindset and deliver great experiences, benefitting an entire organization.
Posted: 06 May 2019 | Published: 06 May 2019


Hitachi ID Group Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement