IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security PoliciesReports
 
Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

Acceptable Use: How to Write a Mobility Policy Document Employees Will Actually Follow
sponsored by BlackBerry
WHITE PAPER: A mobile computing policy document tells employees what's expected of them when it comes to using these devices for work. It marks out the responsibilities of the company as well.Read this white paper to find out how to write a mobile policy document that employees will understand and follow
Posted: 18 Aug 2014 | Published: 22 Jul 2014

BlackBerry

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration
sponsored by Cyber-Ark Software
WHITE PAPER: This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.
Posted: 30 Jul 2014 | Published: 31 May 2014

Cyber-Ark Software

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement