IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
1 - 25 of 853 Matches Previous Page  |  Next Page
Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Create a Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: The white paper presents tips for creating a persuasive business case for better security investment.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye

Achieve offline VDI with no infrastructure costs
sponsored by 1e Inc
EGUIDE: In this informative e-guide, learn important tips to help avoid POS security breaches. Additionally, find out about client virtualization software from 1E that offers offline VDI without infrastructure costs, and how you can ditch unnecessary software licenses.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

1e Inc

Executive breach response playbook
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this white paper for a step-by-step guide on how to lead your organization through a crisis with comprehensive planning, sound leadership, and more.
Posted: 25 Mar 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: This survey reveals how IT professionals view effective executive involvement in threat mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Mitigate Your Biggest Security Risk: Business Users
sponsored by ObserveIT
WHITE PAPER: Do you know who poses the greatest security risk to your organization? Surprisingly, the answer is people closer than you think: your business users. In this white paper, discover five reasons why business users with access to critical applications are so risky.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

ObserveIT

Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Security Lessons Learned from 2014
sponsored by ESET
WEBCAST: This webcast discusses some of the most prevalent threats of 2014 and the lessons learned from them.
Posted: 12 Mar 2015 | Premiered: Dec 31, 2014

ESET

ARUP BUILDS A MOBILE FIRST FUTURE WITH MOBILEIRON
sponsored by MobileIron
WHITE PAPER: Access this whitepaper and find out how one company successfully created and secured mobile applications for their organization.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

St. Joseph Health Mobilizes Patient Care with MobileIron Solutions
sponsored by MobileIron
WHITE PAPER: This whitepaper provides valuable information on mobile device management and security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

MobileIron Platform Overview
sponsored by MobileIron
VIDEO: Access this one-of-a-kind video and find out how one company can successful protect your mobile devices and applications.
Posted: 11 Mar 2015 | Premiered: 16 Jun 2014

MobileIron

6 Tips for Getting the Most out of Email Security as a Service
sponsored by Mimecast
EGUIDE: This expert e-guide offers six tips to get the most out of your email security solution and how to evaluate email security as a service providers. View now to learn more.
Posted: 10 Mar 2015 | Published: 07 Jan 2015

Mimecast

2015 Cybersecurity Legislation
sponsored by ESET
WEBCAST: This webcast gives you the background you need on proposed cybercrime laws and how they impact you.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST: In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014

Veracode, Inc.

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Case Study: App Code Security from the Ground Up
sponsored by Veracode, Inc.
WEBCAST: View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.
Posted: 02 Mar 2015 | Premiered: Jul 7, 2014

Veracode, Inc.
1 - 25 of 853 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement