IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
1 - 25 of 637 Matches Previous Page  |  Next Page
The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Automated, Real-time Risk Analysis and Remediation
sponsored by FireMon
WHITE PAPER: Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

FireMon

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

Compliance As Code - A Visual Guide
sponsored by Flux7
WHITE PAPER: Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Flux7

How SecOps Addresses Critical Security Vulnerabilities
sponsored by BMC
WHITE PAPER: The rising number of devices connected to any given network, combined with common breakdown in communication between security and operations, creates a huge vulnerability problem. Use this white paper to find out how you can get your SecOps back on track.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

BMC

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

How User Monitoring Helps Protect Against
sponsored by Veriato, Inc.
WHITE PAPER: In this white paper you'll learn why simply trusting your employees not to abuse their powers is not enough, and how this user and entity behavior analytics (UEBA) platform paired with user activity monitoring (UAM) can help create the secure environment you need.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

The Ransomware Survival Handbook
sponsored by Barkly
WHITE PAPER: This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Your 3 Step Cybersecurity Checklist
sponsored by Barkly
WHITE PAPER: IT security is a shifting landscape, and your policy needs to be ready to meet today's threats, as well as those that are still evolving. Find a 3-step checklist designed to help you craft a robust and adaptive security policy.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Ransomware Spread
sponsored by Lepide Software
WHITE PAPER: Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 26 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

The Rise Of The Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Creating an Organisational-Wide Culture of Security
sponsored by Dell SecureWorks
WHITE PAPER: When the winds of IT trends change, your security system needs to be able to change with them. Click inside to learn why an effective communication workflow is key to building an organization-wide culture around cybersecurity.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


When Playing Pokémon Go, Employees Expose Sensitive Corporate Data
sponsored by Cisco Cloudlock
WHITE PAPER: 44% of employees signed into the popular mobile app Pokemon Go using corporate credentials, creating huge security problems. Learn how implementing a specific application use policy can help minimize the risks apps like this pose, and more.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Cloudlock

We Need to Talk About Cybersecurity: Moving on from the "Ad Hoc" Stage
sponsored by Dell SecureWorks
WHITE PAPER: Simply dealing with problems as they arise isn't enough – to keep your organization truly protected you need a cybersecurity plan. Learn 5 steps to developing your own cyber-business risk model.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks
1 - 25 of 637 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement