IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
1 - 25 of 914 Matches Previous Page  |  Next Page
How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

Finding Peace of Mind in Your Security Strategy
sponsored by Rackspace
WEBCAST: As successful breaches continue to plague organizations, it’s more important than ever to evaluate common risk areas and address them accordingly. In this webcast, join the SVP of Security at Alert Logic as they highlight key areas of vulnerabilities and how threats are evolving with organizational infrastructure. Read on to learn more.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Rackspace

Season 2 Episode 3 Diving into WAF and on Ways to Prevent DDoS
sponsored by Rackspace
PODCAST: In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.
Posted: 02 Apr 2020 | Premiered: Mar 29, 2019

Rackspace

Cyber Confidence: Building a Trustworthy Security Posture
sponsored by Nominet
WHITE PAPER: As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.
Posted: 01 Apr 2020 | Published: 01 Apr 2020


Locking Down Private Security
sponsored by Rackspace
WHITE PAPER: The most common concerns related to cloud migrations are typically related to security. However, cloud users – especially private cloud users – often realize improvements to their security. In this white paper, discover key security challenges and learn how organizations are evolving their defenses to meet the needs of the private cloud.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Rackspace

How Do Vulnerabilities Get into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Re-thinking Application Security
sponsored by Tala Security
WHITE PAPER: Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Cybersecurity for Remote Workers
sponsored by Cisco Umbrella
EBOOK: As the network changes, so too does attack methodology. Today’s threats often target remote users, and security teams need a way to ensure HQ workers receive the same level of protection as those who work from home. This e-book addresses these challenges and offers a potential fix: DNS-layer security. Read the e-book to learn more.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Cisco Umbrella

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Multi-Factor Authentication for Customers
sponsored by Ping Identity Corporation
WHITE PAPER: Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Why Critical National Infrastructure (CNI) Providers Need CNI-Ready Security
sponsored by Nominet
WHITE PAPER: In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.
Posted: 31 Mar 2020 | Published: 31 Mar 2020


Two Years of Active Cyber Defense Infographic
sponsored by Nominet
RESOURCE: Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.
Posted: 31 Mar 2020 | Published: 31 Mar 2020


Enabling Your Enterprise with Fast, Agile, Customer IAM In the Cloud
sponsored by Ping Identity Corporation
WEBCAST: One vector that hackers are eager to expose is sensitive data associated with customer-facing apps and interfaces. The same way that employee IAM enables organizations to control and manage access, customer IAM (CIAM) provides a secure and seamless user experience. Watch this webinar to discover the benefits of incorporating CIAM.
Posted: 30 Mar 2020 | Premiered: May 31, 2019

Ping Identity Corporation

5 Ways to Boost Agility by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Ping Identity Corporation

The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage
1 - 25 of 914 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info