Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Reports
76 - 100 of 304 Matches Previous Page  |  Next Page
Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER: Discover how your enterprise can put the OODA Loop (Observe, Orient, Decide, Act) philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breaches. Learn to observe a crisis from all angles, review events in the context of other network activity to establish a timeline, quickly implement remediation, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

AlienVault

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016

Armor

Eliminating Constraints to SSL Implementation
sponsored by Blue Coat Systems
RESOURCE: Find comprehensive information on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Uncover ways to increase its performance, scalability, and root out malicious activity using it as a cover.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Implementing Data Privacy Requirements For Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover how to create visibility to encrypted traffic, reducing the risk of malicious activity that goes unnoticed. Also find out how to achieve simple, effective policy enforcement.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
RESOURCE: In this resource, you'll find an easy to follow guide for success when it comes to the troubles Payment Card Industry Data Security Standards (PCI DSS) can cause your enterprise. Uncover 5 steps to achieving PCI DSS compliance.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

AlienVault

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

ESG Lab Review: User Behavior Analytics
sponsored by Exabeam
ANALYST REPORT: Discover the results of hands-on testing of a User Behavior Analytics (UBA) platform. Learn not only what such a platform should provide, but also how it tracks its users, identifies anomalous behaviors, and more.
Posted: 26 Jul 2016 | Published: 31 Mar 2016

Exabeam

Technology Platforms for Business Integration
sponsored by Infor
WHITE PAPER: Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Dated financial systems tie you to old processes that can limit growth and increase risk. You must be agile and capable of supporting international growth, rather than hindering it. Explore how you can make your financial management system and processes an asset to global expansion, not an obstacle.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Applying Data Science to User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Exabeam

Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER: Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

AlienVault

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Mobility In Government Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry
76 - 100 of 304 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement