Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Reports
26 - 50 of 307 Matches Previous Page  |  Next Page
Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM

The Practical Guide to Enterprise Mobile Security
sponsored by Lookout
ESSENTIAL GUIDE: Access now to help security and IT managers fulfill their dual (and evolving) role of both enabling end-user and device productivity while reducing risk through the adoption of modern-enterprise mobile security practices.
Posted: 31 Aug 2016 | Published: 31 May 2016

Lookout

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This step-by-step guide takes you through the 11 things that an enterprise needs to do in order to de-risk apps and employees and maximize their use of adopting cloud applications and services. Learn not only the benefits, but the pitfalls and dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

The Evolution and Impact of Hidden Mobile Threats
sponsored by Wandera
WHITE PAPER: Learn to protect your mobile workforce and their devices comprehensively in this white paper. Uncover the many attack vectors malicious users and programs use to target vital enterprise and personal data, and how to plug any gaps you many have in your defenses.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Wandera

Quantifying the Riskand Economic Impactof Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Online Archiving Now Easier Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

Case Study: Cut Mobile Data Costs and Bolster Security
sponsored by Wandera
CASE STUDY: Discover how Hillcrest identified and addressed its mobile data usage problem, and now is enjoying annual savings of roughly €34,700, equating to an 850% ROI. Learn how it cut its mobile bills by 68% and also protects its workers from browser malware, leaking apps, phishing attacks, poisoned cache exploits, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Wandera

The Need For Comprehensive Email Security Is Greater Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how to keep your email secure, easily and affordably. Learn about how to deploy an adaptive spam defense, sophisticated threat detection, email continuity, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

Don't let your on-premises Active Directory be your Achilles' heel
sponsored by Dell, Inc.
WHITE PAPER: Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Dell, Inc.

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

AlienVault

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Perspective: The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records savings, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks
26 - 50 of 307 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement