IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityWhite Papers (View All Report Types)
76 - 100 of 205 Matches Previous Page  | Next Page
Maximize the business value of your information
sponsored by Iron Mountain
WHITE PAPER: Your company's information is the most valuable asset you have, so protecting it and getting the most business value possible from it is vital to your enterprise's success. Read this white paper to learn how to maximize the value of your physical and digital data to reduce costs, improve efficiency, and reduce risk.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

10 Ways Desktop Virtualization can Boost Security Capabilities
sponsored by Citrix
WHITE PAPER: Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology.
Posted: 10 Jan 2012 | Published: 18 Jun 2013

Citrix

How to tackle information lifecycle management
sponsored by ComputerWeekly.com
WHITE PAPER: Many information assets within an organisation have an associated value relative to thebusiness impact of an incident or threat that affects the confidentiality, availability,authenticity or availability of the information.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to tackle Enterprise Information Protection & Control
sponsored by ComputerWeekly.com
WHITE PAPER: Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM).
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security
sponsored by RSA
WHITE PAPER: With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

RSA

Storage Data Protection Strategies In Today’s Data Center
sponsored by Oracle Corporation
WHITE PAPER: An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.
Posted: 07 Mar 2012 | Published: 18 Jan 2012

Oracle Corporation

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

How to Effectively Secure Electronic Health Records
sponsored by HP and Intel
WHITE PAPER: In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection!
Posted: 29 Feb 2012 | Published: 29 Feb 2012

HP and Intel

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Information Governance: Audit and Protection on the IBM System z Platform
sponsored by IBM
WHITE PAPER: Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.
Posted: 09 Feb 2012 | Published: 30 Nov 2011

IBM

Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Tripwire, Inc.

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Best Practices for a Successful DLP Deployment
sponsored by TITUS
WHITE PAPER: This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start.
Posted: 08 Nov 2011 | Published: 08 Nov 2011

TITUS

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

Advanced Threats: The New World Order
sponsored by RSA
WHITE PAPER: This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

RSA

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Advanced Persistent Threats: From “FUD” to Facts
sponsored by Websense, Inc.
WHITE PAPER: What is Advanced Persistent Threat (APT)? Too much marketing hype and FUD (fear, uncertainty, and doubt) have clouded the facts about a very real danger to organizations of all sizes. View this paper to gain a better understanding of APT and how to mitigate your risks. 
Posted: 21 Oct 2011 | Published: 21 Oct 2011

Websense, Inc.

Winning the PCI Compliance Battle
sponsored by Qualys
WHITE PAPER: This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Posted: 17 Oct 2011 | Published: 17 Oct 2011

Qualys

Information Classification: Delivering Security and Business Value
sponsored by Boldon James
WHITE PAPER: This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


Selecting the right DLP solution: Enterprise, Lite, or Channel?
sponsored by Websense, Inc.
WHITE PAPER: DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.
Posted: 06 Oct 2011 | Published: 06 Oct 2011

Websense, Inc.

The Hidden Costs of Microsoft® BitLocker®: White Paper
sponsored by WinMagic
WHITE PAPER: This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business.
Posted: 19 Aug 2011 | Published: 19 Aug 2011

WinMagic

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Easy DLP - Data Protection Loss
sponsored by Boldon James
WHITE PAPER: This paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.
Posted: 19 Jul 2011 | Published: 19 Jul 2011


Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures
sponsored by Sybase, an SAP company
WHITE PAPER: Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!
Posted: 17 Jun 2011 | Published: 15 Jun 2011

Sybase, an SAP company
76 - 100 of 205 Matches Previous Page    2 3 4 5 6 7    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement