IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
1 - 25 of 1065 Matches Previous Page  |  Next Page
State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Manage Risk and Compliance with ServiceNow GRC
sponsored by ServiceNow
RESOURCE: The global regulatory environment continues to evolve making it imperative for organizations to have an integrated risk program. Are you well-positioned to monitor, prioritize, and automate response to business risks in real time? Learn about ServiceNow GRC – an option that could help you ensure rapid identification and response to risk.
Posted: 05 Dec 2018 | Published: 31 Dec 2018

ServiceNow

The Real Business Drivers of Data Compliance
sponsored by Micro Focus
WHITE PAPER: Although fines and reputational damage are frequently stated as instigators of action to adopt GDPR, this white paper reveals a broader set of rationales for engagement. Learn more about the advantages of GDPR in terms of compliance, operational efficiency and revenue.
Posted: 04 Dec 2018 | Published: 31 Jul 2018

Micro Focus

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Swimlane

How a Leading Hearing Aid Provider Enhances its Security Strategy
sponsored by Forcepoint
CASE STUDY: Discover how AudioNova, one of the largest providers of hearing aids in Europe with over 1,200 stores in 13 countries, was able to overcome its biggest security challenge, security management consolidation, with a highly scalable and flexible cloud solution.
Posted: 05 Sep 2018 | Published: 31 Dec 2017

Forcepoint

Rethinking Security Efficacy: How to Reduce and Manage Your Business Risk
sponsored by Citrix
WHITE PAPER: IT and security leaders are encountering ever-increasing levels of risk and exposure to breaches. Download this white paper to learn how to manage your security in the ever-changing digital environment and respond effectively to threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Security Change is Inevitable in the Cloud Era
sponsored by Cisco Umbrella
WEBCAST: Hear from Eric Ahlm, research director at Gartner and Meg Diaz, head of product marketing for Cisco Umbrella as they discuss how modern conveniences in the way we access data can lead to security risks as organizations move their sensitive data to the cloud.
Posted: 31 Aug 2018 | Premiered: Aug 31, 2018

Cisco Umbrella

The Business Value of Secure HCI
sponsored by Dell EMC and VMware
DATA SHEET: Read on for more on Dell EMC VxRail, which provides a secure, resilient hyperconverged infrastructure ideal for keeping VMware-based virtualization environments safe.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Dell EMC and VMware

How to Best Secure DNS? There's More Than One Approach
sponsored by SearchSecurity.com
EBOOK: Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

How Visibility of the Attack Surface Minimizes Risk
sponsored by Skybox Security
RESOURCE: Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Data protection: A business imperative
sponsored by IBM
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

How GDPR will be ITSM's time to shine
sponsored by Perspectium
WEBCAST: GDPR is here and compliance is mandatory. Tune in now to find out exactly which steps you'll need to take today to reach GDPR compliance, and all of the impacts that the GDPR is likely to make on your ITSM.
Posted: 15 Oct 2018 | Premiered: Mar 14, 2018

Perspectium

Enforcing Continuous Compliance and Security Best Practices on AWS
sponsored by Amazon Web Services
VIDEO: Tune into this webcast to learn how a leading cybersecurity company was able to actively enforce security and compliance policies on AWS, as it actively scaled up.
Posted: 08 Oct 2018 | Premiered: 28 Sep 2018

Amazon Web Services

Why GDPR is Nothing to Fear
sponsored by FireMon
WHITE PAPER: Download this guide for the steps your organization can take to maintain compliance with GDPR regulations and fortify consumer trust.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

Disrupting Security: Revamping IT Security Through SecOps and Incident Management
sponsored by PagerDuty
EBOOK: Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

PagerDuty

Veeam Backup & Replication 9.5 Update 3: Infrastructure Hardening
sponsored by GreenPages Inc.
WHITE PAPER: This paper provides practical advice to help admins reduce their infrastructure attack surface so that they can confidently deploy Veeam services and lower their chances of being compromised. Read on for several measures to take to harden your Veeam Availability infrastructure against threats.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

GreenPages Inc.

Top 7 Office 365 Security Use Cases for a CASB
sponsored by McAfee, Inc.
RESOURCE: In this 67-page resource, you'll uncover 7 Microsoft Office 365 use cases for CASB to help consolidate security and compliance capabilities to keep your data safe and secure.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

McAfee, Inc.

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk
1 - 25 of 1065 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement