IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
176 - 200 of 1126 Matches Previous Page  |  Next Page
Focus ASEAN: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 10 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Q&A: Analyzing DNS Services with Paul Vixie
sponsored by Farsight Security
EGUIDE: Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.
Posted: 10 Apr 2017 | Published: 04 Apr 2017

Farsight Security

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

How to Gain Passive DNS for Enhanced Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Access this white paper to discover how improving your DNS data collection can enhance your threat intelligence, give you faster, more accurate detection/mitigation abilities vs cyberattacks, and more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

Farsight Security

Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell India
RESEARCH CONTENT: In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Dell India

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

Farsight Security

Top Internet of Things Security Concerns
sponsored by Peak10
WHITE PAPER: 70% of IoT ready devices are vulnerable to hackers, and it doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.
Posted: 03 Apr 2017 | Published: 02 Mar 2017

Peak10

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

7 Critical Considerations for Choosing a Cloud Security Provider
sponsored by Akamai
WHITE PAPER: Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud and uncover the 7 key factors to consider when evaluating a cloud provider.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

Moving to the Cloud: The Buyer's Guide to Cloud Security
sponsored by Akamai
EBOOK: In this e-book, learn how you can augment your existing security processes with additional cloud measures for a more robust web security posture. You'll also learn why cloud-based security matters, how even average DDoS attacks can challenge weaker solutions, and more.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Akamai

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering
sponsored by MobileIron
WHITE PAPER: Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

MobileIron

The Missing Piece in the GDPR Puzzle
sponsored by Collibra
EBOOK: The clock is ticking. Regulators will issue significant fines for GDPR non-compliance next year. However, with such a massive regulation, where do you begin? Access this resource to uncover how to prepare your organization in the countdown and discover how data governance can help ensure you're GDPR compliant.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Collibra

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

A Network Manager's Guide to Ransomware
sponsored by Cisco Umbrella
RESOURCE: Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

Cisco Umbrella

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell
176 - 200 of 1126 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement