IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
51 - 75 of 489 Matches Previous Page  |  Next Page
Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Five Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 02 Sep 2014 | Published: 16 May 2014

IBM

Six Ways You May Be Losing Mobile Data and Not Even Know It
sponsored by Symantec Corporation
WHITE PAPER: This crucial white paper outlines the 6 ways that your mobile data could be compromised, and why you might not even realize that it's happening until it's too late.
Posted: 29 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Top Ten Tips for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: Learn the top 10 ways to secure your business against cyber risk and threats in this informative infographic.
Posted: 27 Aug 2014 | Published: 30 Jun 2014

Symantec Corporation

A Roadmap to Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: Discover what it takes to become cyber resilient in this informative white paper.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Symantec Corporation

BYOD or Bust: Are Your Mobile Policies Keeping Up with Your Employees?
sponsored by Symantec Corporation
WHITE PAPER: What is BYOD? Why should business people pay attention to it? Get the background on the bring-your-own-device trend, and learn how your organization should meet emerging opportunities and threats, in this report.
Posted: 26 Aug 2014 | Published: 30 Apr 2013

Symantec Corporation

Symantec RSA Survey Report: Expertise, Insider Threats Still Challenging
sponsored by Symantec Corporation
WHITE PAPER: In this RSA survey, learn which IT areas are still a security challenge, and what industry leaders recommend.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

Symantec Corporation

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

The Three Phases of Securing Privileged Accounts- A Best Practices Guide
sponsored by Cyber-Ark Software
WHITE PAPER: This helpful white paper explains exactly how privileged account security works, and outlines the best practices for implementing it for your organization.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cyber-Ark Software

Implementing Privileged Account Security to Address Advanced Threats
sponsored by Cyber-Ark Software
WHITE PAPER: In this informative Q&A, you'll get inside information from industry analysts as they discuss the best security practices for IT professionals, why privileged account security is vital to a successful security plan, and how to protect your systems from new strategies utilized by cybercriminals.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Cyber-Ark Software

How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration
sponsored by Cyber-Ark Software
WHITE PAPER: This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.
Posted: 30 Jul 2014 | Published: 31 May 2014

Cyber-Ark Software

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 21 Jul 2014 | Published: 15 Nov 2012

Dell, Inc. and Intel®

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®
51 - 75 of 489 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement