IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
1 - 25 of 532 Matches Previous Page  |  Next Page
The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

BYOD and Mobile Security Report
sponsored by BitGlass
WHITE PAPER: Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers
sponsored by Bomgar Corp.
WHITE PAPER: Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Bomgar Corp.

Top 5 SIEM Challenges for the Midmarket
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Arctic Wolf Networks, Inc.

Arapahoe House Secures BYOD
sponsored by BitGlass
WHITE PAPER: In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

BitGlass

Endpoint Security Suites: How 15 Providers Stack Up
sponsored by Trend Micro
WHITE PAPER: In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.
Posted: 21 Nov 2016 | Published: 19 Oct 2016

Trend Micro

Market Guide for Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.
Posted: 18 Nov 2016 | Published: 24 Oct 2016

BitGlass

In-Depth Reviews for SIEM Buyers
sponsored by AlienVault
WHITE PAPER: Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

Protecting Data In The Age of Employee Churn
sponsored by Code42
WHITE PAPER: Learn how the relatively high churn rate of today's knowledge workers, combined with trends like BYOD, puts enterprise data at risk, and how to mitigate it.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Code42

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

Biometrics: A Modern Method Of Authentication
sponsored by Comarch
WHITE PAPER: Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Comarch

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how to provide industry-leading performance, scalability, resiliency, and accessibility to your data centers. Learn about modern security threats to your centers, the consequences of substandard or nonexistent security measures, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Juniper Networks, Inc.

Password Management Evaluation Guide for Businesses
sponsored by Keeper Security Inc
WHITE PAPER: Learn the little-known reasons as to why passwords don't live up to their potential as security measures, how they cause data breaches, and how your organization can enhance its use of passwords to keep your data safe and secure.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Keeper Security Inc

Why Your Business Needs Enterprise-Strength Password Management
sponsored by Keeper Security Inc
WHITE PAPER: Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Keeper Security Inc

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM
1 - 25 of 532 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement