IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
51 - 75 of 560 Matches Previous Page  |  Next Page
Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases
sponsored by Logentries
WHITE PAPER: Explore 4 use cases that exemplify why real-time analytics using log data streams are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Logentries

How to Keep Your Organization Safe from Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Wireless Security: Keeping Intrusion Prevention Systems Simple and Effective
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to avoid wrongful classification of devices on your network, keep your wireless secure, and eliminate false alarms and the effort of defining complex rules to identify rogue wireless devices and manually inspecting them.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Guest Wi-Fi: The Most Valuable Marketing Tool for Physical Businesses
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to keep your Wi-Fi secure, scalable, and feature-rich while gaining insight into its users, their patterns, and other marketing data. Read on to securely gain the capabilities of high-priced marketing without the price tag.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Email-borne Malware Highlights Danger of Over-reliance on Sandboxes
sponsored by Mimecast North America
WHITE PAPER: Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast North America
WHITE PAPER: Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Email Security in a Zero Trust World
sponsored by Mimecast North America
WHITE PAPER: Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Improve Network Security Speed and Performance
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

Network Security: How Miller Paint Saved $150k a Year
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

WatchGuard Technologies, Inc.

7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

A CISO’s Guide to Mobile Threat Prevention
sponsored by SingTel
WHITE PAPER: Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

SingTel

Cybersecurity: Shift from a Position of Acknowledgement to Leadership
sponsored by SingTel
WHITE PAPER: Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

SingTel

2017 Security Protection: 7 Threat Predictions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

WatchGuard Technologies, Inc.

Keep Business Data Secure, and Employees Productive
sponsored by SOTI Inc.
WHITE PAPER: The rate of mobile devices coming into the workplace is rapidly driving the need for secure enterprise mobility management. Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

Five Mobile Security Myths Debunked
sponsored by SingTel
WHITE PAPER: Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SingTel
51 - 75 of 560 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement