IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security PoliciesReports
26 - 50 of 761 Matches Previous Page  | Next Page
Handling Security in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Avoiding Cloud Security Audit Pitfalls
sponsored by INetU Inc.
WHITE PAPER: This resource defines the top 5 most common cloud audit pitfalls, and offers suggestions on how to avoid each.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

INetU Inc.

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Rackspace and NetIQ - A Success Story
sponsored by NetIQ
WEBCAST: This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2013

NetIQ

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Enterprise Strategy Group Improving Incident Response with NetCitadel
sponsored by NetCitadel
WEBCAST: In this video, Enterprise Strategy Group's Jon Oltsik looks at the weakness of detection-focused security strategies doomed to failure. Responding to threats is what really keeps firms out of the headlines, and organizations need to prepare properly.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetCitadel

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Multifactor Authentication: Removing Risk While Simplifying Processes
sponsored by NetIQ
WHITE PAPER: In this resource, learn how multi-factor authentication brings that extra line of defense your organization needs to protect against malicious hackers.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: This resource highlights key security differences in traditional infrastructures versus the cloud. Click through to learn how to leverage existing methods to create a well-rounded cloud security approach.
Posted: 31 Mar 2014 | Published: 06 Jan 2014

CloudPassage

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

Using Privacy as a Business Differentiator
sponsored by Peak 10
WHITE PAPER: Click through for a discussion on contextual privacy, and what businesses should do in order to balance new opportunities with data protection.
Posted: 24 Mar 2014 | Published: 11 Feb 2014

Peak 10

International Mobile Security: Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
sponsored by Cisco
WHITE PAPER: This white paper features a flexible, modular approach to mobile strategies that ensures optimum user access and experience, while offering robust security.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Binary Option: Neustar SiteProtect Case Study
sponsored by Neustar®
CASE STUDY: This exclusive case study examines how an independent trading website was able to utilize a security service that protects against DDoS attacks 24/7, mitigating the attack when it occurs and escalating when needed.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Migrating Data to the Cloud? Have a Safe Trip.
sponsored by Peak 10
WHITE PAPER: This resource goes over some of the things to consider when moving data to the cloud. Choosing the right provider has a lot to do with the success of your storage in the cloud, and this resource provides the questions that need to be asked to make sure the right vendor is chosen.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®
26 - 50 of 761 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement