IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
151 - 175 of 856 Matches Previous Page  |  Next Page
Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Why European Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This white paper debunks common misconceptions about European data protection law, considers the characteristics of an excellent Managed Security Services Provider for data protection law purposes, and more.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks

Common Use of Mobile Devices Makes Strong Case for Strong BYOD
sponsored by TigerText, Inc.
EGUIDE: Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

TigerText, Inc.

Healthcare Mobile Device Support Means Security Management
sponsored by TigerText, Inc.
EGUIDE: This expert e-guide from SearchHealthIT.com highlights two leading HCOs successful experiences with implementing secure BYOD programs. Click through to unveil 8 mobile device security tactics and policies to help you achieve similar results.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

TigerText, Inc.

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
EGUIDE: Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Cut through complexity: The key to IAM success
sponsored by RSA
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

SearchSecurity.com

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA
151 - 175 of 856 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement