IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security PoliciesWhite Papers (View All Report Types)
 
Acceptable Use: How to Write a Mobility Policy Document Employees Will Actually Follow
sponsored by BlackBerry
WHITE PAPER: A mobile computing policy document tells employees what's expected of them when it comes to using these devices for work. It marks out the responsibilities of the company as well.Read this white paper to find out how to write a mobile policy document that employees will understand and follow
Posted: 18 Aug 2014 | Published: 22 Jul 2014

BlackBerry

Separating Work and Personal at the Platform Level: How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines a tool that separates work data from personal data on mobile devices so that you can provide the best security without sacrificing the user experience.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

BlackBerry

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
WHITE PAPER: This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Posted: 22 Jul 2014 | Published: 21 Feb 2013

CDW Corporation

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement