IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies White Papers (View All Report Types)
51 - 75 of 480 Matches Previous Page  |  Next Page
Mobile Policies: How to Write Guidelines Employees Will Follow
sponsored by BlackBerry
WHITE PAPER: This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD or COPE strategy.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

BlackBerry

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Top Security Concerns and Trends Takeaways
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Email Security Checklist: Eight Steps for Success
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Five Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
51 - 75 of 480 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement