IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
51 - 75 of 854 Matches Previous Page  |  Next Page
Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks
sponsored by SurfWatch Labs
WHITE PAPER: This white paper illustrates the latest trends in the cyber risk landscape showing how unencrypted computers and other devices plague IT. Continue reading to learn why you can't afford to ignore data and device encryption.
Posted: 12 Jan 2016 | Published: 31 Aug 2015

SurfWatch Labs

The Insider Threat: From Risk to Detection
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

Interset Software Inc.

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Best Practices for UNIX/LINUX Priviledged Identity and Access Management
sponsored by FoxT
WHITE PAPER: On Unix/Linux OSs, the all-powerful "root" privilege is the key to your organization facing a serious breach. This white paper explores the importance of limiting access privileges and the vulnerabilities root privileges create. Read on and learn Unix/Linux OS best practices
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

OPM Breach: Why Security Needs to be a Priority
sponsored by FoxT
WHITE PAPER: Learn more about the political battle security teams are losing and why root access requirements leave your organization open to an IAM hack in this white paper. Find out how to granularly manage access accounts and control privileges across diverse operating systems.
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

Financial Institution Uses BoKs to Centralize Access Controls Across 50,000 Servers
sponsored by FoxT
CASE STUDY: In this case study, you will learn how to centralize and automate the user account administration across your servers, enabling you to allocate fewer resources to security administration and control access. Access this study to address key regulatory compliance mandates.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER: In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

Your Guide to Zen and the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

5 Steps to Empowering Employees for Secure Cloud Service Usage
sponsored by IBM
WHITE PAPER: This brief infographic highlights five necessary steps to secure cloud service usage. Find out how you can discover, identify, and track cloud application usage and ultimately empower employees to safely use cloud services.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

IBM

2015 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: In this report, view the impact of data breaches and observe cost trends over time. Access this global study to learn where to invest your resources to mitigate the chance of an attack and how proper business continuity management can reduce the costs of data breaches for your organization.
Posted: 07 Dec 2015 | Published: 30 Jun 2015

IBM

Sensible one-page thoughts on performance: People at work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

ComputerWeekly.com

Reimagining Security: A New Way to Think
sponsored by IBM
VIDEO: Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.
Posted: 01 Dec 2015 | Premiered: 07 Apr 2015

IBM

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Security Information and Event Management FAQs
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.
Posted: 20 Nov 2015 | Published: 30 Nov 2011

AccelOps Inc.

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014

LogicNow

Threat intelligence sharing and the government's role
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

ComputerWeekly.com

Cyber security: Balancing risks and controls for finance professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

ComputerWeekly.com

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cyber security professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Endpoint Security: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com
51 - 75 of 854 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement