IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
1 - 25 of 473 Matches Previous Page  |  Next Page
Cisco 2016 Annual Security Report
sponsored by Cisco
WHITE PAPER: This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.
Posted: 04 Feb 2016 | Published: 01 Feb 2016

Cisco

Layered Security Strategies for a Mobile-First World
sponsored by Microsoft
WHITE PAPER: This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.
Posted: 03 Feb 2016 | Published: 27 Nov 2015

Microsoft

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.
Posted: 28 Jan 2016 | Published: 15 Dec 2015

Dimension Data

Secure Any Data, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.
Posted: 25 Jan 2016 | Published: 01 Dec 2015

Vera

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Factoring the Human Element into Your Data Breach Response
sponsored by AllClear ID
WHITE PAPER: Access this white paper to see how emotional reactions to a security breach can affect your crisis management.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

AllClear ID

FedRAMP and the Department of Defense's Security Requirements Guide
sponsored by Coalfire
WHITE PAPER: This white paper reviews FedRAMP, the Security Requirements Guide (SRG) and provides guidance for cloud service providers that are interested in upgrading to the new baseline.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Coalfire

Top 6 Dangers of Not Inspecting SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.
Posted: 25 Jan 2016 | Published: 21 Jan 2016

A10 Networks

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

Using Identity to Create Next Generation, Risk-based Access Management
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.
Posted: 20 Jan 2016 | Published: 31 Aug 2015

SecureAuth

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Threat Detection Methods and Best Practices
sponsored by Interset Software Inc.
WHITE PAPER: This e-guide will explain to you how the industry is changing and adapting new functionality to protect against ever-evolving attacks. It will teach you how to confidently choose the security tools you'll need that will provide proper functionality and value.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

Interset Software Inc.

FISMA vs FedRAMP Controls and Authorization Differences
sponsored by Coalfire
WHITE PAPER: Inside this white paper, you'll learn the differences between FISMA and FedRAMP, including how the controls tested and the authorization process compare for both FISMA and FedRAMP. Read on to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Coalfire

SANS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

AlienVault

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

IBM

Combating the Next Generation of Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

WatchGuard Technologies, Inc.

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Top 5 Network Security Challenges Faced By the Distributed Enterprise
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper, you will discover how to deploy and manage consistent, enterprise-grade network security and secure wireless networks across all your remote locations. In addition, you'll be able to visibly track network health, threats and compliance issues to assist in proactive business decisions.
Posted: 14 Jan 2016 | Published: 16 Dec 2015

WatchGuard Technologies, Inc.

The First Six Steps to Securing Remote Locations
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper you will discover how to distribute a quick, standardized security template for your remote offices to adopt.
Posted: 14 Jan 2016 | Published: 30 Dec 2015

WatchGuard Technologies, Inc.
1 - 25 of 473 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement