IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 
Definition continues below.
Security PoliciesReports
76 - 100 of 750 Matches Previous Page  | Next Page
Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

Managing Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data.
Posted: 18 Feb 2014 | Published: 31 Dec 2011

IBM

Discover and Manage Your Network Perimeter
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper discusses the importance of establishing a network perimeter, examining business trends that change network boundaries, and guiding the use of network perimeters to secure critical data and applications.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Lumeta Corporation

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

The Promises and Pitfalls of BYOD
sponsored by Dell Software
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Dell Software

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

How to Reduce the Cost and Complexity of Two Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: Access this resource to explore key practices for combatting complexity and high cost challenges with two-factor authentication.
Posted: 03 Feb 2014 | Published: 30 Sep 2012

Celestix Networks

Information Security Magazine
sponsored by SearchSecurity.com
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

SearchSecurity.com

The 3 Most Common Compliance Regulations
sponsored by Celestix Networks
WHITE PAPER: This resource highlights the most common requirements and best practices for today's compliance mandates.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

Celestix Networks

PCI DSS 3.0: The Expert's Guide to the New Guidance
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Enable Anytime, Anywhere Access Without Exposing Your Data
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper covers a solution that help you deal with security risks that come from users syncing sensitive data to their home devices.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

ownCloud

Regain Visibility and Control with Cost-effective Next-generation Security
sponsored by Palo Alto Networks
WHITE PAPER: This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Palo Alto Networks

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Identity & Access Management Summit 2014
sponsored by Gartner
BROCHURE: This brochure is for the Gartner Summit, occurring March 17th – 18th, 2014, where attendees can gain 2 days' worth of valuable content regarding identity and access management (IAM). Click now to learn about the global IT leaders who will discuss strategic trends that will keep businesses protected for years to come.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Gartner
76 - 100 of 750 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY POLICIES DEFINITION (continued): … In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.
Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement