IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
51 - 75 of 378 Matches Previous Page  | Next Page
Keep Cloud Compliant
sponsored by SearchCompliance.com
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchCompliance.com

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

SearchSecurity.com

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do!
sponsored by Global Knowledge
WHITE PAPER: Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Enterprise Information Security in Transition
sponsored by IBM
ANALYST REPORT: Enterprise information security is growing increasingly difficult by the minute. This ESG Technology Brief outlines why information security is so challenging and explores how fundamental changes across your people, processes, and technologies are critical to staying ahead of the security curve.
Posted: 21 Aug 2013 | Published: 31 Oct 2012

IBM

Driving Maximum Business Value From Records and Information Management
sponsored by Iron Mountain
EBOOK: Check out this exclusive eBook to explore today's new era of records and information management.
Posted: 09 Aug 2013 | Published: 09 Aug 2013

Iron Mountain

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Information Security Threats: Building Risk Resilience
sponsored by SearchSecurity.com
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Success Story: Company Avoids 3 Serious Consequences of Backup Non-compliance
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that saves them millions of dollars annually by utilizing its trouble ticketing feature.
Posted: 05 Jul 2013 | Published: 28 Jun 2013

APTARE

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett-Packard Company

Webcast: The Newest Information Management Innovation from IBM
sponsored by IBM
WEBCAST: This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Information Governance for Business Value
sponsored by IBM
EGUIDE: In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

Modern Retention Enablement
sponsored by IBM
VIDEO: This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
Posted: 26 Jul 2013 | Premiered: 25 Jun 2012

IBM

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM
51 - 75 of 378 Matches Previous Page    1 2 3 4 5 6    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement