IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
226 - 250 of 995 Matches Previous Page  |  Next Page
Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Sensible one-page thoughts on performance: People at work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

ComputerWeekly.com

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

The Enterprise Security Checklist
sponsored by MASERGY
RESOURCE: This resource presents a seven-step checklist for building rigorous and effective cybersecurity that can combat today's advanced threats.
Posted: 14 Sep 2015 | Published: 15 Jul 2015

MASERGY

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014

LogicNow

Threat intelligence sharing and the government's role
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

ComputerWeekly.com

Cyber security: Balancing risks and controls for finance professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

ComputerWeekly.com

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Fortinet 2016 Predictions for the Evolving Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents today's four most significant cyber-security threats from the hacker's perspective. Access this resource to learn the steps that you need to take to protect your organization from being the next breach victim, as well as how to shift from a reactive to a proactive security approach.
Posted: 05 Jun 2015 | Published: 25 Feb 2015

Fortinet, Inc.

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Micro-Segmentation: Advanced Security From the Inside
sponsored by VMware
RESOURCE: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

The insider threat – solved with DRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

The Cost of a Data Breach and Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: In this report, view the impact of data breaches and observe cost trends over time. Access this global study to learn how to mitigate the chance of an attack and how proper business continuity management can reduce the costs of data breaches for your organization.
Posted: 07 Dec 2015 | Published: 30 Jun 2015

IBM

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Endpoint Security Management: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Top Security Concerns and Trends Takeaways
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
226 - 250 of 995 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement