IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
26 - 50 of 990 Matches Previous Page  |  Next Page
Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Top 10 Security Advantages of One Business Management Platform
sponsored by Acumatica
RESOURCE: Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Acumatica

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 11 Nov 2016 | Published: 15 Nov 2016

ComputerWeekly.com

Case Study: Gain Real-Time Enterprise-Wide Visibility Into Site Operations
sponsored by Splunk
CASE STUDY: In this case study, learn now Zillow, a massive real-estate website, obtained crystal-clear operational visibility. Discover how it provides self-service abilities to teams to create custom solutions, ensures continuous website uptime, and is continually improving its incident isolation and mitigation abilities.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Splunk

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how to provide industry-leading performance, scalability, resiliency, and accessibility to your data centers. Learn about modern security threats to your centers, the consequences of substandard or nonexistent security measures, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Juniper Networks, Inc.

A Step-By-Step Guide to Improving Application Insight
sponsored by Splunk
RESOURCE: In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Splunk

Password Management Evaluation Guide for Businesses
sponsored by Keeper Security Inc
WHITE PAPER: Learn the little-known reasons as to why passwords don't live up to their potential as security measures, how they cause data breaches, and how your organization can enhance its use of passwords to keep your data safe and secure.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Keeper Security Inc

User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases
sponsored by LogRhythm, Inc.
DATA SHEET: Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

LogRhythm, Inc.

Case Study: Alliant Credit Union Evolves Real-Time Fraud Detection
sponsored by LogRhythm, Inc.
CASE STUDY: Read this case study to determine how Alliant Credit Union automated analysis of fraud-related patterns and trends in real time, by consolidating all machine data from IT events and financial transactions on one SIEM platform.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

LogRhythm, Inc.

Why Your Business Needs Enterprise-Strength Password Management
sponsored by Keeper Security Inc
WHITE PAPER: Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Keeper Security Inc

Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016

Check Point Software Technologies Ltd.

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Addressing Your Cloud Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Ease your move to the cloud with the advice offered in this white paper, including an overview of the main classes of cloud architecture, the security consideration of moving to the cloud, key challenges of public and private clouds, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Global Banking Giant Streamlines and Strengthens Cybersecurity
sponsored by Dell SecureWorks
CASE STUDY: In this case study, learn how a European bank secured hundreds of locations worldwide and over 13,500 endpoints. All this while dropping their average of 70 billion security events monthly to 20-40 that needed attention and enhancing their regulatory compliance worldwide.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Dell SecureWorks

Securing the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to secure your enterprise's presence on AWS and maximize your use of the public cloud. Access now to gain an in-depth understanding of how to protect both the public and hybrid cloud during and after transitioning from a traditional "brick and mortar" data center.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Fortinet, Inc.

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Blue Coat Systems
26 - 50 of 990 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement