IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Reports
 
Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this short brief to learn about Zero Trust Access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

2020 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: Last year, 81% of organizations experienced one or more successful cyberattacks. That’s just one revelation in the 2020 Cyberthreat Defense Report that will make you reevaluate your security posture. With insights and statistics, learn how your IT security peers cope in a world that’s no longer business as usual.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

Gigamon

Cybersecurity Risk: A Board’s-Eye View Chapter 2
sponsored by PortSys
EBOOK: When it comes to zero trust architecture, there is no one-size-fits-all package. It’s crucial that you consider which type of zero trust could best suit your organization, especially given the recent spike in vendors boasting zero trust capabilities. Read this short white paper to learn the 3 different flavors of zero trust.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Post-COVID-19 Recovery: Managing Innovation & Cost Optimization from the Back-End Up
sponsored by Centreon Software Systems
EBOOK: Access this 4 chapter e-book to see how businesses are getting back on track from the lens of digital performance and ITOps, discover innovations that are paying for themselves, learn how to be a budget conscious CIO, and more.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

Centreon Software Systems

Take the Next Step in Cloud Security
sponsored by AWS-Splunk
WEBCAST: Join this on-demand webinar with Scott Ward, Principal Solutions Architect at AWS and Wissam Ali-Ahmad, Security Solutions Architect at Splunk as they explain how AWS customers can use Splunk to easily detect future security threats and free up security personal for higher value activities.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

AWS-Splunk

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi Vantara
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi Vantara

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


AV/IT Convergence
sponsored by ViewSonic Corporation
WHITE PAPER: Dive inside this paper to learn about today’s intersection of AV and IT responsibilities —and why interactive touchscreen displays and associated systems represent prime examples of this shift.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

ViewSonic Corporation

Brazilian Multinational Manufacturer Protects Data on the Internet and in the Cloud
sponsored by McAfee, Inc.
CASE STUDY: For Brazilian manufacturer WEG Industries, a recent expansion through acquisition meant it was time to rethink their data protection strategy. Read this case study to learn more about the specific challenges WEG was facing and discover the outcomes of their partnership with McAfee.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info