IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
1 - 25 of 1201 Matches Previous Page  |  Next Page
Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on, and provides 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

GDPR Breach Notification Rule Could Complicate Compliance
sponsored by Lepide Software
EGUIDE: Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
Posted: 15 Sep 2017 | Published: 12 Sep 2017

Lepide Software

How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Read inside about an industry-leading Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Symantec

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

Getting Ready for the EU General Data Protection Regulation
sponsored by Ivanti
WEBCAST: The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.
Posted: 07 Sep 2017 | Premiered: Sep 13, 2017

Ivanti

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

A10 Networks

Cybersecurity 101: The Fundamentals of Today's Threat Landscape
sponsored by Kaspersky Lab
EBOOK: In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

The Complexities of the Secure DIY Cloud
sponsored by Armor
WHITE PAPER: Private and DIY clouds present critical implementation and management challenges when it comes to security and compliance. Learn how to simplify cloud security by anticipating the complexities of cloud migration and adoption.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things
sponsored by A10 Networks
WHITE PAPER: Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

A10 Networks

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

How Should Companies Across the Globe Prepare for EU GDPR Compliance?
sponsored by Commvault
EGUIDE: As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance
Posted: 30 Aug 2017 | Published: 21 Aug 2017

Commvault

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

Build Your Identity and Access Management Strategy
sponsored by RSA
RESEARCH CONTENT: This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.
Posted: 23 Aug 2017 | Published: 03 Apr 2017

RSA

Protecting Data in the Healthcare Industry
sponsored by Mimecast
RESEARCH CONTENT: The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.
Posted: 21 Aug 2017 | Published: 31 Jul 2017

Mimecast

2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.
1 - 25 of 1201 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement