IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
26 - 50 of 881 Matches Previous Page  |  Next Page
6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Top 10 Data Security Mistakes to Avoid
sponsored by EE
WHITE PAPER: This insightful white paper presents the top 10 common security mistakes that countless organizations have made recently.
Posted: 18 May 2015 | Published: 08 Apr 2015

EE

The Keys to BYOD Security Success
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.
Posted: 18 May 2015 | Published: 18 May 2015

Dell, Inc. and Intel®

Reviews and Ratings for 11 Risk Management Products
sponsored by RSA
WHITE PAPER: In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.
Posted: 12 May 2015 | Published: 10 Mar 2015

RSA

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Case Study: Ensuring Automated Access Governance
sponsored by RSA
CASE STUDY: In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.
Posted: 06 May 2015 | Published: 18 Mar 2015

RSA

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

Cloud Security - Why Traditional Measures Won't Cut It
sponsored by Microsoft
RESOURCE: In this white paper, you will uncover how to protect data from known and unknown threats to using a cloud-based security strategy. View now to learn more.
Posted: 06 May 2015 | Published: 11 Dec 2014

Microsoft

Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

The Evolution of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.
Posted: 05 May 2015 | Published: 04 Dec 2014

RSA

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER: This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014

Absolute Software

Web App Security Top 10 Risk Mitigation Techniques
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper lays out the top 10 challenges of and threats to web app security. View now to learn the corresponding 10 risk mitigation techniques to protect web apps.
Posted: 01 May 2015 | Published: 05 Mar 2014

Fortinet, Inc.

Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.
Posted: 01 May 2015 | Published: 15 Oct 2014

IntraLinks, Inc

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014

Absolute Software

Bring Your Own Device: Policy Considerations
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn everything you need to know when building a clear and concise policy document for your BYOD strategy.
Posted: 28 Apr 2015 | Published: 13 Jun 2014

Good Technology

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

SMS: A New Approach to Two Factor Authentication
sponsored by Nexmo
WHITE PAPER: This white paper explores how to secure enterprise data and sensitive information on mobile devices by using two factor authentication (2FA). View now to learn the 15 best practices to implementing a 2FA strategy and ensuring security success.
Posted: 22 Apr 2015 | Published: 21 Jan 2015

Nexmo

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry

How to Achieve Complete Mobile Security without Sacrificing User Experience
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at dealing with the difficult security challenges associated with mobility adoption. Read on to learn more.
Posted: 22 Apr 2015 | Published: 18 Dec 2014

BlackBerry

Hackers and Dating App Vulnerabilities - A Match Made in Heaven
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 most dangerous data app vulnerabilities and offers steps to take for you and your users to mitigate risk.  Read on to learn more.
Posted: 21 Apr 2015 | Published: 11 Feb 2015

IBM
26 - 50 of 881 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement