IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security Policies Reports
76 - 100 of 1117 Matches Previous Page  |  Next Page
Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

How IoT is Changing The Security Landscape
sponsored by Fortinet, Inc.
EGUIDE: In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology.
Posted: 07 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

The Security Risks of IoT
sponsored by Fortinet, Inc.
EGUIDE: In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
Posted: 07 Jun 2017 | Published: 31 May 2017

Fortinet, Inc.

Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix
sponsored by Rapid7
WHITE PAPER: In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Rapid7

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Rapid7

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

SANS Review: SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.
Posted: 02 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Key Security Considerations for Securing the Industrial Internet
sponsored by Bayshore Networks
RESEARCH CONTENT: This IDC white paper explores expert insights into industrial IoT (IIoT) security in a Q&A with Christina Richmond, program director of IDC's infrastructure security services. Learn about key differences for securing industrial infrastructure and current approaches to secure IIoT.
Posted: 30 May 2017 | Published: 31 Jul 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

How to Prepare for a Cloud DDoS Attack on an Enterprise
sponsored by F5 Networks
EGUIDE: Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Develop Your Information Security Management System
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
RESEARCH CONTENT: This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.
Posted: 01 Jun 2017 | Published: 19 Jan 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks
76 - 100 of 1117 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement