IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies White Papers (View All Report Types)
1 - 25 of 590 Matches Previous Page  |  Next Page
McAfee Labs Threat Report
sponsored by McAfee
WHITE PAPER: McAfee Laps has compiled the data collected from their MVISION Insights preview dashboard and constructed a report that shows some of the top security trends from the year 2020 regarding malware, robot vulnerabilities, phishing awareness and more. Access the full report to see trends from across the world.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

McAfee

Forticlient And The Fortinet Security Fabric Deliver Integrated, Advanced Endpoint Protection
sponsored by Fortinet, Inc.
WHITE PAPER: As organizations adopt more endpoints, they risk exposure to data exfiltration, compromised credentials and other threats. This white paper explores some of the shortcomings of traditional endpoint security tools and highlights the key features and capabilities of Fortinet’s next-generation endpoint security offering – read on to get started.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Fortinet, Inc.

Securing Hybrid Cloud Environments And Workloads On Amazon Web Services (AWS)
sponsored by CyberArk Software, Inc
WHITE PAPER: Hybrid cloud infrastructures, like AWS, are on the rise. However, these environments often expand the organization’s attack surface, leaving them vulnerable to new threats. Read this white paper to learn more about the challenges of protecting hybrid infrastructures and how CyberArk is helping AWS users secure their environments and workloads.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

CyberArk Software, Inc

Can You Handle Your Data?
sponsored by HelpSystems
WHITE PAPER: As data security regulations grow stricter and cyberthreats become more complex, organizations need better information handling and data governance policies — which includes the right tools to help them implement their policies. Read this white paper to learn more about data handling in the era of privacy and compliance.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder data (CHD) secure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Which Endpoint Security Enhancements Are Required
sponsored by Fortinet, Inc.
WHITE PAPER: Cyberattackers love endpoints. Why? Well, a successfully compromised laptop, smartphone or IoT device can provide a foothold for attackers to move laterally, infect other endpoints within the organization and gain access to other critical assets. This paper outlines 4 requirements for avoiding these bad actors.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

Fortinet, Inc.

5 Challenges with Hybrid and Hyperscale Data Center Security and How to Solve Them with Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: Enterprise organizations are taking advantage of data center evolution, but they face a number of security challenges as they transition to hybrid and hyperscale data center architectures. Study this white paper to clue in on 5 challenges of hybrid and hyperscale architectures and how Fortinet may help you overcome them.
Posted: 03 Dec 2020 | Published: 05 Sep 2020

Fortinet, Inc.

Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report
sponsored by McAfee
WHITE PAPER: As part of a global trend towards cloud-native environments, organizations of all sizes are embracing Infrastructure-as-a-Service (IaaS) as the new default IT environment. However, IaaS environments are not without risk. Read this report to learn more about cloud-native threats and how your organization can prevent them.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

McAfee

Security
sponsored by DWA UK - Intel
WHITE PAPER: Security threats have never been more numerous, complex, and impactful. Organizations need to ensure that security is built-in from the factory forward, which means focusing on hardware platforms where security is part of the system design. View this abstract to discover Intel’s vPro-based systems, built for today’s demanding requirements.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

DWA UK - Intel

Six IT Security Risks In A Perimeterless World
sponsored by CyberArk Software, Inc
WHITE PAPER: As organizations move away from data centers towards cloud environments, traditional perimeter security approaches become obsolete. So, how can organizations protect their data in a post-perimeter world? Read this white paper to learn more about the security risks and opportunities in the cloud era.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

CyberArk Software, Inc

What Is Data Classification And What Can It Do For My Business?
sponsored by HelpSystems
WHITE PAPER: Data classification plays a key role in the management and protection of an organization’s sensitive or confidential data – but how does it work? What are the best approaches? Read this e-book to learn more about data classification and what it can do for your business.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

HelpSystems

Creating a Culture of Security
sponsored by HelpSystems
WHITE PAPER: You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not at the same time creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Sensitive Data Everywhere: Find It, Classify It, Manage It, and Protect It
sponsored by Fasoo
WHITE PAPER: Data naturally proliferates within an organization, and as most of this created data is now unstructured, it’s no longer effective to only apply controls to traditional databases and apps. In this impact brief, get a glimpse of some of the available solutions for securing unstructured data.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Fasoo

Securing The Enterprise’s Cloud Workloads On Microsoft Azure
sponsored by CyberArk Software, Inc
WHITE PAPER: Cloud adoption is becoming increasingly common, and organizations are embracing cloud capabilities for various reasons. Microsoft Azure is one of the most popular public cloud services – making the protection of Azure environments critical to an organization’s well-being. Read this e-book to learn how CyberArk can help protect Azure workloads.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

CyberArk Software, Inc

Five Actionable Tips For Securing Work-From-Home Arrangements
sponsored by CyberArk Software, Inc
WHITE PAPER: Regardless of infrastructure or size, organizations have had to rapidly support and enable a remote workforce over a short period of time. Naturally, this uncovered several operational and security challenges. Read this report to discover 5 tips designed to help your organization secure your remote workforce without sacrificing productivity.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

CyberArk Software, Inc

7 Lessons Every CISO Can Learn From the ANU Attack
sponsored by Claranet
WHITE PAPER: The Australian National University (ANU) cyberattack of 2018 was devastating – a hacker went undetected in their network for 6 weeks, granting them time to download malware, conduct phishing attacks, and exfiltrate data. Read this white paper to learn 7 major lessons every CISO can learn from the ANU cyberattack.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Claranet

Stimulus Phishing Report: The Newest Wave of Pandemic Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Inky Technology

The Argument for a Better Authenticator
sponsored by BIO-key International
WHITE PAPER: While passwords have traditionally provided the gateway to the web, they now provide open access to hackers. Cards, PINs and tokens were introduced to add an additional layer of security, but even these solutions have shown their inherent vulnerabilities. Browse this white paper to see why biometric authentication may be next up in MFA.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

BIO-key International

How to Protect Valuable Human Assets, As Well As Your Attack Surface
sponsored by Claranet
WHITE PAPER: Today’s human assets and attack surfaces are at significant risk, and it’s up to organizations to address these emerging pressures and protect their people. This short white paper from Claranet highlights how this can be achieved – read on to learn more.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

Claranet

The Vital Role of Security in Digital Transformation
sponsored by HelpSystems
WHITE PAPER: Right now, every business is being pushed to transform by one or more of these 3 key drivers: consumer demand, technology and competition. But security can cast a long shadow over digital transformation – so how do you move forward? In this white paper, learn where security may be headed.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

HelpSystems

Classification by Design: The Foundation of Effective Data Protection Compliance
sponsored by HelpSystems
WHITE PAPER: According to Forrester, a significant proportion of security decision makers have not invested in data discovery and classification. This is likely due to the growing complexity within compliance. This white paper may help you make sense of the chaos by outlining why regulatory data compliance is growing harder to achieve.
Posted: 01 Dec 2020 | Published: 30 Oct 2020

HelpSystems

DNS Network Traffic Volumes During the 2020 Pandemic
sponsored by Farsight Security
WHITE PAPER: The pandemic has driven more people online than ever before. By reading this study, you can comprehend how traffic volumes for passive DNS cache miss traffic have changed since the outbreak of COVID-19. 316 online sites were used for this study, and these sites spanned across 5 categories: News, travel, retail, streaming and higher education.
Posted: 01 Dec 2020 | Published: 27 May 2020

Farsight Security

An Inside View into a Supply Chain Attack
sponsored by Panorays
WHITE PAPER: For the most part, supply chain attacks use malware to target laptops or other network devices. However, this white paper explores a supply chain attack that targeted a service provider. Read on to see how it differed, discover the warning signs of a pending attack and uncover 5 steps your organization should take to mitigate risk.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Panorays
1 - 25 of 590 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info