Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards White Papers (View All Report Types)
1 - 25 of 328 Matches Previous Page  |  Next Page
Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Mobile and Cloud Security: MobileIron vs Microsoft Intune
sponsored by MobileIron
WHITE PAPER: Uncover the highlights the key differences between MobileIron and Microsoft's Intune. Discover how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 26 May 2017 | Published: 26 May 2017

MobileIron

Implementing Effective Incident Response
sponsored by Rsam
WHITE PAPER: Uncover how to more efficiently and more effectively respond to incidents with an incident response platform.
Posted: 26 May 2017 | Published: 26 May 2017

Rsam

Five DLP Tips from Security Executives
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn 5 tips to improve your organization's DLP, how to use DLP to protect regulated data and reduce business risk, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Don't Settle for Good Enough Mobile Security: Transform Business Processes
sponsored by MobileIron
WHITE PAPER: Discover what your enterprise needs to consider in an EMM solution, and how to deploy one that will provide fully integrated mobile, cloud, and desktop management, protect your email on smartphones, and more.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

Protect Against WannaCry: A Ransomware "Weapon of Mass Destruction"
sponsored by arcserve
WHITE PAPER: Learn how to address your organization's vulnerability in the face of WannaCry, ensure you have real-world ransomware recovery in case of disaster, circumvent ransom demands and protect your data, and more.
Posted: 25 May 2017 | Published: 25 May 2017

arcserve

Europol and Security Leaders Declare War on Ransomware
sponsored by Barracuda Networks - AWS
WHITE PAPER: Discover how "No More Ransom," a coalition of law enforcement and a growing number of cybersecurity companies, created an online resource for cybercrime victims and keep it secure against waves of daily attacks.
Posted: 25 May 2017 | Published: 25 May 2017

Barracuda Networks - AWS

Plan, Don't Panic: When Colossal DDoS Attacks Loom
sponsored by A10 Networks
WHITE PAPER: Dive deep into a rundown of recent DDoS attacks and the specific enterprise challenges they present and how to prepare your organization's defense.
Posted: 25 May 2017 | Published: 10 Nov 2016

A10 Networks

Accelerate DevOps by Automating Security
sponsored by evident.io
WHITE PAPER: Discover how to use a modern cloud-native approach to security and compliance, leveraging automation and the API-centric architecture of the cloud, so DevOps teams can enjoy accelerated development cycles while reducing the risk of breaches or delays and more.
Posted: 25 May 2017 | Published: 25 May 2017

evident.io

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

MSSPs: Benefits, Challenges and Trends
sponsored by AlienVault
WHITE PAPER: Discover the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource, their security programs.
Posted: 25 May 2017 | Published: 25 May 2017

AlienVault

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Ensure your DDoS Solution Works in Real-World Conditions
sponsored by A10 Networks
WHITE PAPER: Learn about the various types of DDoS attacks, challenges that are involved with detecting and mitigating these attacks, importance of validating any threat protection solution for real-world performance, and more.
Posted: 25 May 2017 | Published: 25 May 2017

A10 Networks

Ensure Web App Security with Your WAF on AWS
sponsored by Barracuda Networks - AWS
WHITE PAPER: Learn how to protect your cloud deployments and web applications against advanced application layer attacks, and how to automate the defense through Amazon Web Services to improve efficiency.
Posted: 25 May 2017 | Published: 25 May 2017

Barracuda Networks - AWS

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Leveraging a Security-First Approach to Compliance
sponsored by evident.io
WHITE PAPER: Learn how to meet the challenges of public cloud environments with a modern approach of a security-first model which enables continuous visibility through automation and more.
Posted: 23 May 2017 | Published: 23 May 2017

evident.io

Why You Need an Automated Approach to Cloud Security and Compliance
sponsored by evident.io
WHITE PAPER: Learn how to embrace a continuous security model, making your organization able to automate many processes that would normally overwhelm your teams and systems if they had to be done manually.
Posted: 22 May 2017 | Published: 22 May 2017

evident.io

Detecting "WannaCry" Ransomware
sponsored by AlienVault
WHITE PAPER: Discover how the recent "WannaCry" ransomware attacks function, what to update to avoid it, how to scan your environment for the vulnerability it exploited, and more.
Posted: 22 May 2017 | Published: 22 May 2017

AlienVault

Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape
1 - 25 of 328 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement