IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
1 - 25 of 387 Matches Previous Page  | Next Page
Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Three Kinds of Chaos: Establishing collaboration and control in a chaotic world
sponsored by Clearswift
WHITE PAPER: This white paper reveals why collaboration and control are both equally important, especially with evolving security threats.
Posted: 15 Oct 2014 | Published: 01 Mar 2014

Clearswift

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Under Siege From Web Threats:APAC Countries Respond In Patchwork and Tardy Fashion
sponsored by Akamai Technologies
WHITE PAPER: Access the following white report to examine some of the toughest security challenges facing organizations today including insight into how to avoid performance-robbing practices being used by far-too-many companies.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian

Gartner: Digital transformation: How to survive the information crisis
sponsored by ComputerWeekly.com
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Enterprise Security: Attacking the problems of application and mobile security
sponsored by Orasi
WHITE PAPER: Mobile devices, applications, and the network infrastructure are particularly vulnerable to attack and intrusion – and can all too often be the weak link in an otherwise secure enterprise infrastructure. This in-depth resource dives into trends in enterprise security, focusing on mobile systems and malware.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Orasi

Lower Risk and Cost with Proactive Information Governance
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how to ensure that your data assets are available, protected and managed through their entire lifecycle.
Posted: 20 Sep 2014 | Published: 12 Feb 2014

Hewlett-Packard Company

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

ViaLumina Executive Brief Series: Evaluating Information Governance Technology
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper to find out key considerations for evaluating information governance technologies, such as centralized policy management, multiple data types, governing information where it lives, and more.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Hewlett-Packard Company

Symantec Implements Holistic Changes to Backup Exec 2014
sponsored by Symantec Corporation
WHITE PAPER: This ESG resource examines a powerful, flexible, and easy to use backup solution.
Posted: 20 Aug 2014 | Published: 30 Jun 2014

Symantec Corporation

Examining Large File Backup and Single Platform Solutions for Backup and Archive
sponsored by Rand Secure Data
EGUIDE: In this e-guide, learn from the experts at SearchDataBackup.com how to effectively backup large files. Additionally, examine how backup and archive can be achieved utilizing a single software platform as well as common misconceptions about this approach.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Rand Secure Data

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private.
Posted: 13 Aug 2014 | Published: 18 Jul 2014

BlackBerry

SIEM Tools to Optimize IT Security Management and Simplify Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this vendor landscape report to see how the top 10 SIEM vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

BlackBerry

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic

Information security for SMEs
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett-Packard Company

Preventing Dangerous File-Sharing
sponsored by GlobalScape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

GlobalScape
1 - 25 of 387 Matches Previous Page    1 2 3 4    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement