Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards White Papers (View All Report Types)
76 - 100 of 249 Matches Previous Page  |  Next Page
A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 01 May 2017 | Published: 01 May 2017

Splunk

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This ESG Lab Validation examines the need to addresses advanced email-based threats with Advanced Email Security. ESG Lab evaluated how Proofpoint's unified, multilayered solution offers clear visibility into all of an organization's email and any threats it may contain, along with the ability to respond to and stop those threats.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

Transitioning from Managed Services to Managed Security
sponsored by AlienVault
WHITE PAPER: Transitioning from MSP to MSSP is a well-trodden path and success is due to people, processes, and tech in equal proportions. In this white paper, learn about the current state of the MSSP market and best practices for new MSSPs.
Posted: 25 Apr 2017 | Published: 01 Jul 2017

AlienVault

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

Privileged Account Management for Dummies
sponsored by Thycotic
WHITE PAPER: Uncover how privileged account management is more important to understand and protect today than ever before. This guide will help you to avoid catastrophic data breaches and possible massive monetary and reputational damage to your organization.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Thycotic

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: Learn how to use BitLocker as a starting point for enterprise device encryption, and where to go from there to achieve full disk encryption for your organization.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

WinMagic

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

A Guide to Better BitLocker Management
sponsored by WinMagic
WHITE PAPER: Discover 5 identified Microsoft BitLocker Administration and Monitoring (MBAM) shortcomings and what can be done to mitigate the cost of deploying an FDE security strategy.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

WinMagic

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks has cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

The Dark Side of SSL That Today's Enterprise Can't Ignore
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory
76 - 100 of 249 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement