IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
1 - 25 of 1422 Matches Previous Page  |  Next Page
Leverage the SOC Visibility Triad to Automate Attacker Detection & Response
sponsored by Vectra AI
VIDEO: In order to help organizations coordinate security efforts and improve threat response, Gartner came up with the SOC Visibility Triad model, which consists of 3 key capabilities – NDR, EDR & SIEM/UEBA. The following webinar discusses how to best leverage the SOC Visibility Triad to improve security performance – watch now.
Posted: 26 Oct 2020 | Premiered: 26 Oct 2020

Vectra AI

The Trusted Data Center and Server Infrastructure: Mid-Market Organizations
sponsored by Dell Technologies Partner Program
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies Partner Program

Top 10 Reasons for Migrating to CipherTrust Manager for KeySecure Customers
sponsored by Thales
WHITE PAPER: For years, the KeySecure platform has equipped organizations with key management and data protection capabilities across their organizations. The following white paper highlights 10 reasons why KeySecure users should switch over to Thales’s next-gen CipherTrust manager – read on to learn more.
Posted: 26 Oct 2020 | Published: 30 Jun 2020

Thales

CipherTrust Data Security Platform
sponsored by Thales
DATA SHEET: Security pros tasked with ensuring data protection are facing challenges on 3 fronts: looming cyberthreats, growing compliance requirements, and expanding environments. Read this data sheet for a closer look at the key features and capabilities of Thales’ CipherTrust Data Security Platform – which looks to alleviate these pain points.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Thales

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales

Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?
sponsored by Bitdefender
RESOURCE: The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.
Posted: 23 Oct 2020 | Published: 21 Oct 2020

Bitdefender

How Secureworks Offers a Holistic Approach to Security
sponsored by Dell SecureWorks
WHITE PAPER: In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Dell SecureWorks

How to Improve ROI and Operational Efficiency for Cybersecurity
sponsored by Vectra AI
PRODUCT OVERVIEW: The effects of the cybersecurity skills gap are most prominent when it comes to threat detection and response – teams are overworked by the sheer volume of alerts, not to mention the effort it takes to flag and isolate threats before it’s too late. Read this white paper for an overview of Vectra’s AI offering, which aims to remedy this gap.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER: Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor

Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Operational Cost, Security-Related Risk: Quantifying the Value of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increased security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

From Reactive to Proactive: Keys to Shifting Your Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: A constant state of readiness is crucial when it comes to cybersecurity. Senior leaders who embrace this ethos stand a much better chance of minimizing the damages, risks, and costs than leaders who have no plan and respond to threats reactively. How do you take on this stance? Read this white paper to learn 4 keys to security proactivity.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

You’ve Been Compromised: Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

On-Demand Webinar: The Importance of Cloud Governance
sponsored by Concourse Labs
WEBCAST: Automated cloud governance is emerging as one of the most effective ways organizations can ensure security and compliance at scale as they migrate towards cloud environments. Watch this webinar to learn more about the importance of cloud governance, its role in digital transformation, and more.
Posted: 21 Oct 2020 | Premiered: Oct 21, 2020

Concourse Labs

The Six Steps to Effective Cloud Governance
sponsored by Concourse Labs
WHITE PAPER: Without effective cloud governance, cloud migrations would present disastrous security risks – threatening an organizations financial health, regulatory compliance and reputation. This eBook provides 6 regimented steps to help organization achieve effective cloud governance.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Top 10 Security Events to Monitor in Azure AD and Office 365
sponsored by Quest
EBOOK: Microsoft reports that 95 million active directory (AD) accounts are the target of cyberattack each day, and 1.2 million Azure AD accounts are compromised each month. To avoid breaches, you must keep an eye on changes to roles, groups, applications and more. Read this e-book to learn the top 10 events that Azure AD and O365 admins track closely.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Quest
1 - 25 of 1422 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info