IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
26 - 50 of 523 Matches Previous Page  |  Next Page
7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

A CISO’s Guide to Mobile Threat Prevention
sponsored by SingTel
WHITE PAPER: Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

SingTel

Cybersecurity: Shift from a Position of Acknowledgement to Leadership
sponsored by SingTel
WHITE PAPER: Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

SingTel

2017 Security Protection: 7 Threat Predictions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

WatchGuard Technologies, Inc.

Mobile: Enhanced Security, Consistent Management, Open Framework
sponsored by SOTI Inc.
WHITE PAPER: Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program. Read on to find challenges to both strategies, what benefits can be reaped from this approach, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

Five Mobile Security Myths Debunked
sponsored by SingTel
WHITE PAPER: Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SingTel

Security for the Future-Ready Workforce
sponsored by Dell, Inc. & Intel®
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Best Practices for Dealing With Phishing and Ransomware
sponsored by SingTel
WHITE PAPER: Learn how to counter the modern threat landscape of phishing, ransomware, and other malware. An enterprise's defense against such malignant activates can mean the difference between success and going out of business.
Posted: 05 Jan 2017 | Published: 30 Sep 2016

SingTel

Survey Findings: Data Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Five Tactics to Stop Email Attacks
sponsored by Mimecast North America
WHITE PAPER: Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast North America
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 03 Jan 2017 | Published: 21 Jul 2016

Mimecast North America

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry

Mobile Security Addressing the Evolving Threat Landscape
sponsored by SOTI Inc.
WHITE PAPER: Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

SOTI Inc.

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

The Suspicious Seven: A Network Visibility Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

Cisco Systems, Inc.

Secure Enterprise File Sharing and Mobile Content Management
sponsored by BlackBerry
WHITE PAPER: Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

BlackBerry

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Tackle Insider Threats Head-On By Building A Proactive Security Culture
sponsored by Intel Security
WHITE PAPER: More than 40% of data loss is caused by company insiders. Use this white paper to find ways your company can reduce the chance of internal data loss by fostering a trusted security culture, creating employee profiles, and more.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Intel Security

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass
26 - 50 of 523 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement