IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
126 - 150 of 1119 Matches Previous Page  |  Next Page
Remove Complexity from Defending Data with a Secure Managed Cloud
sponsored by Armor
WHITE PAPER: The complexities of cybersecurity are daunting for any organization. But for businesses that need battle-tested security and infrastructure to defend critical data workloads and assets that intricacy is magnified. Learn about a cloud security platform that can remove the complexity from defending data with key security functionality.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Armor

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

Ransomware guide
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to defend your organization from ransomware with an advanced security model, utilizing next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Fortinet, Inc.

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Securing Data Across Your Every Environment
sponsored by Gemalto
WHITE PAPER: Learn about cryptographic keys and how they can secure your vital data. Discover the 4V's model, how the level of encryption is applied, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

How to Keep Your Data Secure Without a Big Security Team
sponsored by Armor
WHITE PAPER: Uncover how your organization can not only centralize your security management processes, but also increasingly support your business objectives and protect your sensitive data inside and out.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

Mitigate the Harm a Lack of Security Professionals Can Do
sponsored by Armor
WHITE PAPER: Cybersecurity is a tricky subject in today's threat landscape. Learn how to gain a significant cybersecurity advantage, providing your organization with proactive vulnerability scanning, continuous patching and monitoring, dedicated compliance expertise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Why Perimeter Defenses Fail in the Face of Modern Threats
sponsored by Gemalto
WHITE PAPER: Discover what security features businesses are focusing on, why perimeter defense is not a cure-all for data breaches, and the consequences for not proofing your organization adequately for the modern threat landscape.
Posted: 13 Mar 2017 | Published: 31 May 2016

Gemalto

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

How to Implement a Continuous Application Monitoring Security Initiative
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn how to protect your applications with a continuous application monitoring security initiative, ensuring that your organization's apps in production are secure and stay secure once launched.
Posted: 13 Mar 2017 | Premiered: Mar 13, 2017

Hewlett Packard Enterprise

How the Game of Application Security is Changing
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn how a Runtime Application Self-Protection (RASP) can shore up the protection that traditional perimeter defenses are lacking against modern threats.
Posted: 10 Mar 2017 | Premiered: Nov 16, 2016

Hewlett Packard Enterprise

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall

THE SILVER LINING - Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
RESOURCE: In this quick infographic discover the hard numbers on how to protect corporate information in the cloud, and how the numbers of companies not embracing the cloud is shrinking.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Symantec & Blue Coat Systems

Hackers Have a Plan to Get to Your Privileged Accounts
sponsored by One Identity
WHITE PAPER: Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

The Low hanging fruit of IAM – three fundamental things you should be doing
sponsored by One Identity
WHITE PAPER: Learn how to address where to begin with IAM and security solutions, how they are multi-layered, and 3 IAM best practices to ensure your enterprise has a strong security posture.
Posted: 10 Mar 2017 | Published: 31 Dec 2016

One Identity

Your Guide to Managed Security for Amazon Web Services
sponsored by Armor
WHITE PAPER: Uncover the tools you need to regain control and visibility, reduce costs, and ensure security down to the core of your AWS usage.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Armor

How Shadow IT Became Key to Multi-Cloud Strategies
sponsored by Armor
WHITE PAPER: Learn how your organization's workforce has created a web of shadow IT and how you can harness it to enjoy the benefits and control the risks to launch a successful multi-cloud strategy.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Euronext Euronext’s recent IPO was a catalyst to create a coherent security environment across the new business.
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The point of security isn't just safeguarding data, mitigating loss, and providing ROI. Ultimately it's about providing peace of mind. Discover how Euronext was able to go beyond standard virus and scanning capability, reduce threat risk across their technology estate, improve threat visibility, mitigation and resolution action , and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Keeping Your Private Data Secure
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to protect your organization with various types of encryption, allowing your data to possibly stay safe even in the event of a breach.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor
126 - 150 of 1119 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement