IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
1 - 25 of 995 Matches Previous Page  |  Next Page
The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

BYOD and Mobile Security Report
sponsored by BitGlass
WHITE PAPER: Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers
sponsored by Bomgar Corp.
WHITE PAPER: Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Bomgar Corp.

Top 5 SIEM Challenges for the Midmarket
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Arctic Wolf Networks, Inc.

The 7 Step Hack: Thinking Like a Cybercriminal
sponsored by Bomgar Corp.
RESOURCE: Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Bomgar Corp.

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

Arapahoe House Secures BYOD
sponsored by BitGlass
WHITE PAPER: In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

BitGlass

Endpoint Security Suites: How 15 Providers Stack Up
sponsored by Trend Micro
WHITE PAPER: In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.
Posted: 21 Nov 2016 | Published: 19 Oct 2016

Trend Micro

Security Analytics: Searching for Meaning
sponsored by SearchSecurity.com
EBOOK: This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

SearchSecurity.com

Optimize Your SIEM Operations
sponsored by Intel Security
RESOURCE CENTER: Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Intel Security

Market Guide for Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.
Posted: 18 Nov 2016 | Published: 24 Oct 2016

BitGlass

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

In-Depth Reviews for SIEM Buyers
sponsored by AlienVault
WHITE PAPER: Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by Intel Security
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Intel Security

The Security Balancing Act
sponsored by RES Software
RESOURCE: This infographic explains why taking a people-centric approach to managing security, governance, and identity and access management is the best way to secure and empower the digital workforce. Learn how to provide dynamic security for your productive workforce.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Protecting Data In The Age of Employee Churn
sponsored by Code42
WHITE PAPER: Learn how the relatively high churn rate of today's knowledge workers, combined with trends like BYOD, puts enterprise data at risk, and how to mitigate it.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Code42

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

Biometrics: A Modern Method Of Authentication
sponsored by Comarch
WHITE PAPER: Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Comarch

Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM
1 - 25 of 995 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement