Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Reports
101 - 125 of 345 Matches Previous Page  |  Next Page
Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Advanced Security at Scale in the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this thorough guide to the cloud, learn how to properly scale security in the public cloud, secure workloads in AWS, comply with the AWS shared-responsibility security model, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

Securing the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to secure your enterprise's presence on AWS and maximize your use of the public cloud. Access now to gain an in-depth understanding of how to protect both the public and hybrid cloud during and after transitioning from a traditional "brick and mortar" data center.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Fortinet, Inc.

The 2016 Economics of Web Scraping Report
sponsored by Distil Networks
WHITE PAPER: Access this report to learn how web scraper bots are a threat to your online content, how exactly these malicious bots are costing you money, and most importantly, what you can do to protect your content – and your revenue.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Distil Networks

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: BYOD in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud through a multitude of devices. This infographic provides 9 BYOD security facts to help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016

Commvault

Secure Web Gateway Test Report
sponsored by Trustwave
ANALYST REPORT: NSS Labs performed an independent test of the Trustwave Secure Web Gateway SWG TS500 v11.6.0.28. This report describes the test results and will help you determine if this secure web gateway tool is right for you.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

Trustwave

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Five Important Truths About Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper discover 5 steps to meeting digital workspace security objectives, and taking a people-centric approach to security that doesn't come at the cost of productivity or user experience.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

RES Software

Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Appthority

Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: The biggest obstacles to achieving "incident response excellence" are security and IT tool integration and coordinating incident response. Learn how the right security operations solution could simplify the coordination of incident response measures, effectively reducing your time-to-response.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ServiceNow

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

MobileIron

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys

IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016


What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE: In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

Delta Risk

Security Audit Planning and Preparation: Engage Early and Often
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

Why So Many Enterprises Lack Proper Authentication Methods
sponsored by RSA Softcat
EGUIDE: Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat
101 - 125 of 345 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement