Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Multimedia (View All Report Types)
22 Matches
5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions that every cloud user should be asking their providers. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how they actually handle data security and privacy, don't assume each provider hold the same terms and conditions, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Secure Your High-Value Assets in Half the Time
sponsored by Illumio
WEBCAST: This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Pain-Free Secure App Migration
sponsored by Illumio
WEBCAST: This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Zero-Day Attacks: Why you need a Deeper Level of Inspection
sponsored by Check Point Software Technologies Ltd.
VIDEO: Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.
Posted: 25 Mar 2016 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

Secure Cloud Access Reference Architecture & Use Model
sponsored by Intel
WEBCAST: This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).
Posted: 28 Feb 2011 | Premiered: Mar 17, 2011, 14:00 EDT (18:00 GMT)

Intel

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Video - Vulnerability Management in a Web 2.0 World
sponsored by Lumension
VIDEOCAST: Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Posted: 28 Jan 2009 | Premiered: Jan 28, 2009

Lumension

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM
22 Matches
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement