IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security PoliciesWhite Papers (View All Report Types)
51 - 75 of 450 Matches Previous Page  | Next Page
9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

Protecting Your Mid-Size Business from Today's Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Hewlett-Packard Company

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Sophisticated Attacks - The Four Things you Can do now to Help Keep Your Organization Safe
sponsored by IBM
WHITE PAPER: This guide takes a look at IT staff shortages and how managed security services providers (MSSPs) can help minimize issues with the technical skills dilemma.
Posted: 10 Mar 2014 | Published: 31 May 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Integrated IT Security for Midsize Businesses
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Henan Mobile Achieves Information Security with Centralized, Automated Platform
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study features one telecommunications company's experience implementing a centralized, automated network security management platform. Read through to see how the business is benefiting from improved information security and simplified management.
Posted: 24 Feb 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis
51 - 75 of 450 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement