IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
51 - 75 of 389 Matches Previous Page  | Next Page
Applying the Four Standards of Security-Based CIA
sponsored by Global Knowledge
WHITE PAPER: High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Global Knowledge

Keep Cloud Compliant
sponsored by SearchCompliance.com
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchCompliance.com

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

Webroot

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do!
sponsored by Global Knowledge
WHITE PAPER: Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Enterprise Information Security in Transition
sponsored by IBM
ANALYST REPORT: Enterprise information security is growing increasingly difficult by the minute. This ESG Technology Brief outlines why information security is so challenging and explores how fundamental changes across your people, processes, and technologies are critical to staying ahead of the security curve.
Posted: 21 Aug 2013 | Published: 31 Oct 2012

IBM

The Need for Data Loss Prevention Now
sponsored by Clearswift
WHITE PAPER: This resource takes a deep look at why data leakage prevention (DLP) is so vital to data protection, explains the multiple ways data can leak out of your enterprise, and outlines a five-step approach to reaching DLP nirvana.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

Clearswift

Information Governance and Adaptive Redaction: The Next Generation of DLP Technology
sponsored by Clearswift
WHITE PAPER: Simply put, traditional DLP cannot provide the information governance you need without hindering real-time business processes. Inside, learn how an information governance platform with built-in DCI and adaptive redaction can help.
Posted: 14 Aug 2013 | Published: 14 Aug 2013

Clearswift

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Pay-as-you-Grow Data Protection
sponsored by IBM
WHITE PAPER: This resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.
Posted: 07 Nov 2013 | Published: 28 Feb 2013

IBM

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
sponsored by IBM
WHITE PAPER: This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

IBM

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

IT Security. Fighting the Silent Threat
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky Lab

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: If you stop to ask yourself how your security strategy is doing, more likely than not you'd say it's going fine, right? This resource is a prime opportunity to conduct a personal security report card to double check that all of your security i's are dotted and t's crossed.
Posted: 30 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett-Packard Company

Webcast: The Newest Information Management Innovation from IBM
sponsored by IBM
WEBCAST: This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM
51 - 75 of 389 Matches Previous Page    1 2 3 4 5 6    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement