IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
26 - 50 of 1049 Matches Previous Page  |  Next Page
Primer for Protection Against Cyberattacks: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: In this primer, learn how business email compromise (BEC) attacks make inroads to businesses of all sizes. Then explore some strategies on how you can avoid becoming a victim of this scam.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

Top 3 Challenges Your Team Faces when Building in the Cloud
sponsored by TrendMicro
WHITE PAPER: In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

Web security: Important but often overlooked
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 24 Nov 2017 | Published: 24 Nov 2017

ComputerWeekly.com

Protecting Users and Data with Cloud Security
sponsored by Cisco Umbrella
EBOOK: In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cisco Umbrella

Security and Compliance Strategies for Success
sponsored by Citrix
EBOOK: Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

The Human Side of IT Security
sponsored by Dell EMC and Microsoft
WHITE PAPER: Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".
Posted: 02 Oct 2017 | Published: 31 Dec 2014

Dell EMC and Microsoft

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER: In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

Rapid7

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

GDPR Breach Notification Rule Could Complicate Compliance
sponsored by Lepide Software
EGUIDE: Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
Posted: 15 Sep 2017 | Published: 12 Sep 2017

Lepide Software

How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Symantec

How Should Companies Across the Globe Prepare for EU GDPR Compliance?
sponsored by Commvault
EGUIDE: As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance
Posted: 30 Aug 2017 | Published: 21 Aug 2017

Commvault

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud
26 - 50 of 1049 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement