IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
1 - 25 of 1049 Matches Previous Page  |  Next Page
Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Configure Security Policies for Endpoints & End-Users with Confidence
sponsored by IBM
RESOURCE CENTER: In this custom resource center, find out how your unified endpoint management (UEM) strategy can help you simplify policy configuration and enforcement.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

IBM

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Jumio

Hacking Exposed - Attacker Methods and Tactics
sponsored by Cylance
WEBCAST: This webinar covers techniques used to exploit weaknesses in traditional security solutions, and the tactics and tools adversaries use to gain access to vital systems and data.
Posted: 07 Jun 2018 | Premiered: Mar 15, 2018

Cylance

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018


In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

Essential Cybersecurity Training for Your Employees
sponsored by Datto, Inc.
EBOOK: Use this e-book to gain critical information on how to train your workforce on cybersecurity and internet browsing best-practices with real world examples.
Posted: 21 May 2018 | Published: 21 May 2018

Datto, Inc.

Drive Visibility into the Devices Connected to your Network
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: If you can't see an unauthorized or noncompliant device on your network, you can't defend against it. Find out how to drive visibility into the devices on your network, without requiring software agents or previous device knowledge.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.

How to secure cloud and software-defined data centers
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Find how you can meet the added security challenges that stem from increasing virtualization with unified visibility and automated, policy-based controls across your physical and virtual infrastructure.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.

The importance of web security
sponsored by IBM
EGUIDE: Join us as we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 04 May 2018 | Published: 04 May 2018

IBM

Everything You Need to Know About Application Security Policies
sponsored by Veracode, Inc.
RESOURCE: Lacking strong application security policies, your developers and security teams might be overwhelmed by alerts and notifications. Explore some key points to help build your app security program that gives you only the alerts you need.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

Data protection: A business imperative
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

ComputerWeekly.com

Infosec culture: A former helicopter pilot's perspective
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

ComputerWeekly.com

CW ASEAN - March 2018: Time to dial up defences
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

ComputerWeekly.com

CW ANZ - March 2018: Report data break-ins - it's the law
sponsored by ComputerWeekly.com
EZINE: Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

ComputerWeekly.com

Orchestrating SDN Flows for Cybersecurity
sponsored by Radware
RESOURCE: Click inside to learn how the orchestration capabilities of SDN could be use to fight, and even prevent DDos attacks in the future.
Posted: 07 Mar 2018 | Published: 24 Jan 2018

Radware

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

CW Nordics ezine February 2018
sponsored by ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

ComputerWeekly.com

Crafting a Cybersecurity Incident Response Plan, Step by Step
sponsored by SearchSecurity.com
EBOOK: Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

SearchSecurity.com

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

GDPR: 10 essential facts you need to know
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
Posted: 18 May 2018 | Published: 18 May 2018

ComputerWeekly.com

SQL Server Security Practices
sponsored by Idera
WHITE PAPER: Explore some common security practices and how your organization can implement security measures within their deployment of SQL Server.
Posted: 11 May 2018 | Published: 11 May 2018

Idera

Understanding the Trade-offs for Your Next Generation WAN
sponsored by Cato Networks
WHITE PAPER: Find out how legacy WAN connectivity has evolved and moved towards a cloud-based, secure SD-WAN system so that you can create safe, reliable cloud and mobile access to your network.
Posted: 28 Mar 2018 | Published: 27 Mar 2018

Cato Networks
1 - 25 of 1049 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement