Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Reports
51 - 75 of 515 Matches Previous Page  |  Next Page
Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

The Impact of Data Breaches on Reputation and Share Value
sponsored by Centrify Corporation
RESEARCH CONTENT: Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.
Posted: 28 Jun 2017 | Published: 31 May 2017

Centrify Corporation

Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model
sponsored by Centrify Corporation
RESEARCH CONTENT: Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.
Posted: 28 Jun 2017 | Published: 28 Feb 2017

Centrify Corporation

Public Employees' Retirement System Increases Network Visibility and Streamlines Security
sponsored by Gigamon
CASE STUDY: Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting
sponsored by Gigamon
CASE STUDY: Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

See What Matters: Closing Gaps in Network Visibility
sponsored by Gigamon
RESOURCE: Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Troubling Trends in Network Security
sponsored by Gigamon
RESOURCE: Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Overcoming the Human Factor with Visibility-Centric Security
sponsored by Gigamon
RESOURCE: Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Gigamon

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Secure Your Data and Meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: Every company that takes card payments needs to comply with PCI DSS v3.1, and the requirements can get complicated quickly. Learn how to kill two birds with one stone and secure your organization while setting yourself up to comply with PCI DSS v3.1 requirements.
Posted: 15 Jun 2017 | Published: 31 Oct 2015

TrendMicro

Report: Your Guide to Today's Threat Landscape
sponsored by Symantec
WHITE PAPER: Uncover 6 threats to your organization and how they have evolved over the past year, what specific dangers they pose to your enterprise, and what you can do to mitigate their harm.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

10 Benefits to Help Combat Ransomware
sponsored by Symantec
WHITE PAPER: Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro
51 - 75 of 515 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement