IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
1 - 25 of 1078 Matches Previous Page  |  Next Page
How GDPR will be ITSM's time to shine
sponsored by Perspectium
WEBCAST: GDPR is here and compliance is mandatory. Tune in now to find out exactly which steps you'll need to take today to reach GDPR compliance, and all of the impacts that the GDPR is likely to make on your ITSM.
Posted: 15 Oct 2018 | Premiered: Mar 14, 2018

Perspectium

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Swimlane

Enforcing Continuous Compliance and Security Best Practices on AWS
sponsored by Amazon Web Services
VIDEO: Tune into this webcast to learn how a leading cybersecurity company was able to actively enforce security and compliance policies on AWS, as it actively scaled up.
Posted: 08 Oct 2018 | Premiered: 28 Sep 2018

Amazon Web Services

How a Leading Hearing Aid Provider Enhances its Security Strategy
sponsored by Forcepoint
CASE STUDY: Discover how AudioNova, one of the largest providers of hearing aids in Europe with over 1,200 stores in 13 countries, was able to overcome its biggest security challenge, security management consolidation, with a highly scalable and flexible cloud solution.
Posted: 05 Sep 2018 | Published: 31 Dec 2017

Forcepoint

Rethinking Security Efficacy: How to Reduce and Manage Your Business Risk
sponsored by Citrix
WHITE PAPER: IT and security leaders are encountering ever-increasing levels of risk and exposure to breaches. Download this white paper to learn how to manage your security in the ever-changing digital environment and respond effectively to threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Security Change is Inevitable in the Cloud Era
sponsored by Cisco Umbrella
WEBCAST: Hear from Eric Ahlm, research director at Gartner and Meg Diaz, head of product marketing for Cisco Umbrella as they discuss how modern conveniences in the way we access data can lead to security risks as organizations move their sensitive data to the cloud.
Posted: 31 Aug 2018 | Premiered: Aug 31, 2018

Cisco Umbrella

The Business Value of Secure HCI
sponsored by Dell EMC
DATA SHEET: Read on for more on Dell EMC VxRail, which provides a secure, resilient hyperconverged infrastructure ideal for keeping VMware-based virtualization environments safe.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Dell EMC

How to Best Secure DNS? There's More Than One Approach
sponsored by SearchSecurity.com
EBOOK: Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Disrupting Security: Revamping IT Security Through SecOps and Incident Management
sponsored by PagerDuty
EBOOK: Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

PagerDuty

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

How Visibility of the Attack Surface Minimizes Risk
sponsored by Skybox Security
RESOURCE: Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Top 7 Office 365 Security Use Cases for a CASB
sponsored by McAfee, Inc.
RESOURCE: In this 67-page resource, you'll uncover 7 Microsoft Office 365 use cases for CASB to help consolidate security and compliance capabilities to keep your data safe and secure.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

McAfee, Inc.

Data protection: A business imperative
sponsored by IBM
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Jumio

Hacking Exposed - Attacker Methods and Tactics
sponsored by Cylance
WEBCAST: This webinar covers techniques used to exploit weaknesses in traditional security solutions, and the tactics and tools adversaries use to gain access to vital systems and data.
Posted: 07 Jun 2018 | Premiered: Mar 15, 2018

Cylance

Banking on Machine Data
sponsored by Splunk
WHITE PAPER: Financial organizations have unique technology, competitive, regulatory, and demographic requirements that prevent them from achieving their strategic goals. Machine data can help make large strides in improving operational intelligence by having end-to-end visibility of their infrastructure. Download this white paper to discover how.
Posted: 29 Aug 2018 | Published: 31 Dec 2017

Splunk

Analytics-Driven Security in Government
sponsored by Splunk
RESOURCE: To help combat increasing security threats due to added IT complexity, analytics-driven security operations models are being used to enhance the ability to detect, prevent, respond, and predict threats at machine speeds. Download this resource to find out more about this security strategy.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Splunk

Why GDPR is Nothing to Fear
sponsored by FireMon
WHITE PAPER: Download this guide for the steps your organization can take to maintain compliance with GDPR regulations and fortify consumer trust.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

Veeam Backup & Replication 9.5 Update 3: Infrastructure Hardening
sponsored by GreenPages Inc.
WHITE PAPER: This paper provides practical advice to help admins reduce their infrastructure attack surface so that they can confidently deploy Veeam services and lower their chances of being compromised. Read on for several measures to take to harden your Veeam Availability infrastructure against threats.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

GreenPages Inc.

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Configure Security Policies for Endpoints & End-Users with Confidence
sponsored by IBM
RESOURCE CENTER: In this custom resource center, find out how your unified endpoint management (UEM) strategy can help you simplify policy configuration and enforcement.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

IBM

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics
1 - 25 of 1078 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement