IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
1 - 25 of 1006 Matches Previous Page  |  Next Page
Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your security team more efficient when reacting to an assortment of threats and vulnerabilities.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Policing cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 23 Sep 2016 | Published: 23 Sep 2016

ComputerWeekly.com

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

The Benefits of Conducting a Network Security Overview
sponsored by Gigamon
EGUIDE: By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team. Access this e-guide to learn more about the benefits of conducting security overviews of every enterprise initiative and tightening up your enterprise's cybersecurity practices.
Posted: 20 Sep 2016 | Published: 15 Sep 2016

Gigamon

Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Radware

Give Your Threat Counter-Measures a Shot in the Arm
sponsored by Fortinet, Inc.
WHITE PAPER: Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Fortinet, Inc.

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Focus: IT Security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

ComputerWeekly.com

Trusted Identities in Digital Business The Benefits of PKI
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Optimize High-Performing DNS Infrastructures for Greater Security
sponsored by EfficientIP
WHITE PAPER: In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

See How Phillip Morris Ramped Up its Mobile Management Across 60 Countries
sponsored by MobileIron
WHITE PAPER: Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

MobileIron

Protecting Web Services for Grand Slam Roland-Garros
sponsored by EfficientIP
CASE STUDY: Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

Case study : How the French Ministry of Education strengthens front-end security
sponsored by Forcepoint
CASE STUDY: Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Forcepoint

Microsoft Office 365: Enabling More Secure Collaboration
sponsored by VMware, Inc.
WHITE PAPER: Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

VMware, Inc.

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)
1 - 25 of 1006 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement