IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
26 - 50 of 1535 Matches Previous Page  |  Next Page
Act Now: Your 5 Immediate Priorities to Secure A Hybrid Workforce
sponsored by Telstra
ANALYST REPORT: With COVID-19 restrictions easing in some parts of the world and retightening in others, businesses must navigate the technology implications for the phased approach to office-returning staff while balancing the needs of remote and hybrid employees. In this Forrester study, discover 5 key priorities for securing an emerging hybrid workforce.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

Telstra

The CISO's Guide to Rapid Vendor Due Diligence
sponsored by Panorays
EGUIDE: In 2019, nearly half of companies experienced a significant data breach that came through a third party. In response, security pros have begun demanding that vendors demonstrate and maintain healthy security habits. Read this e-guide to discover 7 critical capabilities of a rapid vendor due diligence program.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

Panorays

Security
sponsored by DWA UK - Intel
WHITE PAPER: Security threats have never been more numerous, complex, and impactful. Organizations need to ensure that security is built-in from the factory forward, which means focusing on hardware platforms where security is part of the system design. View this abstract to discover Intel’s vPro-based systems, built for today’s demanding requirements.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

DWA UK - Intel

Six IT Security Risks In A Perimeterless World
sponsored by CyberArk Software, Inc
WHITE PAPER: As organizations move away from data centers towards cloud environments, traditional perimeter security approaches become obsolete. So, how can organizations protect their data in a post-perimeter world? Read this white paper to learn more about the security risks and opportunities in the cloud era.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

CyberArk Software, Inc

What Is Data Classification And What Can It Do For My Business?
sponsored by HelpSystems
WHITE PAPER: Data classification plays a key role in the management and protection of an organization’s sensitive or confidential data – but how does it work? What are the best approaches? Read this e-book to learn more about data classification and what it can do for your business.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

HelpSystems

Creating a Culture of Security
sponsored by HelpSystems
WHITE PAPER: You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not at the same time creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security

Sensitive Data Everywhere: Find It, Classify It, Manage It, and Protect It
sponsored by Fasoo
WHITE PAPER: Data naturally proliferates within an organization, and as most of this created data is now unstructured, it’s no longer effective to only apply controls to traditional databases and apps. In this impact brief, get a glimpse of some of the available solutions for securing unstructured data.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Fasoo

Ensuring Real-Time Endpoint Security on Point-Of-Sale Systems
sponsored by Fortinet, Inc.
DATA SHEET: The increasing number of tools that bad actors have at their disposal puts connected point-of-sale (POS) systems in a vulnerable position. Protecting them requires a security approach with real-time endpoint response & detection. Check out this data sheet to see such a solution that uses AI & ML to orchestrate investigation & response.
Posted: 02 Dec 2020 | Published: 08 Jan 2020

Fortinet, Inc.

Securing The Enterprise’s Cloud Workloads On Microsoft Azure
sponsored by CyberArk Software, Inc
WHITE PAPER: Cloud adoption is becoming increasingly common, and organizations are embracing cloud capabilities for various reasons. Microsoft Azure is one of the most popular public cloud services – making the protection of Azure environments critical to an organization’s well-being. Read this e-book to learn how CyberArk can help protect Azure workloads.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

CyberArk Software, Inc

Multilayered Defense Fortifies Federal Agency’s Security Posture
sponsored by McAfee
CASE STUDY: In this case study, discover how the German Federal Employment Agency was able to address challenges related to compliance, security management and defending against cyberattacks through a partnership with McAfee – which allowed them to simplify and strengthen their security posture.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

McAfee

Five Actionable Tips For Securing Work-From-Home Arrangements
sponsored by CyberArk Software, Inc
WHITE PAPER: Regardless of infrastructure or size, organizations have had to rapidly support and enable a remote workforce over a short period of time. Naturally, this uncovered several operational and security challenges. Read this report to discover 5 tips designed to help your organization secure your remote workforce without sacrificing productivity.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

CyberArk Software, Inc

Detecting a Java Backdoor with Dtex
sponsored by Dtex
CASE STUDY: In this case study, see how a financial services company fell victim to a java backdoor attack – despite having AV, EDR and other security tools deployed – and discover how Dtex’s detection and forensic capabilities enabled a complete time of resolution of under 24 hours.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Dtex

Prevent Data Loss without Operational Overhead
sponsored by Dtex
PRODUCT OVERVIEW: Traditional data loss prevention (DLP) methods are largely manual and resource-intensive to manage, leading to large amounts of false positives and analyst fatigue. In this solution brief, discover DTEX’s DLP tool, designed to meet the needs of today’s increasingly digital and distributed enterprises – read on to get started.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Dtex

Accelerating Your Cloud Transformation with SASE
sponsored by McAfee
WEBCAST: With the massive spike in remote work, organizations are leveraging more cloud resources than ever. But are they doing so securely? What about network capability? The SASE framework empowers organizations to securely embrace the cloud while avoiding complexity, latency and high costs. Jump into this webinar and immerse yourself in SASE.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

McAfee

Introduction to DNSDB Part 2: Walk
sponsored by Farsight Security
WEBCAST: Many people on the internet behave in a way that can be considered ‘unaccountable.’ Some may even use a proxy to hide their true identity. Find out how to see through the smokescreen and pin down the truly bad domains in this DNSDB webinar.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

Farsight Security

7 Lessons Every CISO Can Learn From the ANU Attack
sponsored by Claranet
WHITE PAPER: The Australian National University (ANU) cyberattack of 2018 was devastating – a hacker went undetected in their network for 6 weeks, granting them time to download malware, conduct phishing attacks, and exfiltrate data. Read this white paper to learn 7 major lessons every CISO can learn from the ANU cyberattack.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Claranet

Stimulus Phishing Report: The Newest Wave of Pandemic Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Inky Technology

How a Northeastern State Strengthened Application Security for their Voter Registration System
sponsored by WhiteHat Security
CASE STUDY: Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

WhiteHat Security

The Guide to Managing the Security of your SaaS and Cloud Providers
sponsored by Panorays
WEBCAST: The rapid increase in cloud app usage has opened a massive threat vector. In fact, 59% of organizations have experienced a data breach caused by a third-party. Add a growing list of new regulations to the equation and management becomes a virtual nightmare. Leverage this webinar to learn how to improve your cloud security program.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Panorays

TestFairy Shortens Sales Cycles from Two Months to Two Weeks
sponsored by Panorays
CASE STUDY: The CEO of TestFairy, a prominent mobile testing platform, desired to build his company’s customer base, but the sales process always stalled when attempting to receive security approval. Reason being, security audits were inefficient, and approval took a very long time. Skim through this case study to see how TestFairy cleared this hurdle.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

Panorays

BigFix Inventory: Maintain Software Audit Readiness & Mitigate Security Risks
sponsored by HCL Software
PRODUCT OVERVIEW: Maintaining compliance audit readiness while mitigating the threats of today’s sophisticated cyberattacks can be an exhaustive and resource-intensive endeavor. BigFix Inventory is looking to offset some of the workload for you, read this solution brief to see how they can help with both of these initiatives.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

HCL Software

The Argument for a Better Authenticator
sponsored by BIO-key International
WHITE PAPER: While passwords have traditionally provided the gateway to the web, they now provide open access to hackers. Cards, PINs and tokens were introduced to add an additional layer of security, but even these solutions have shown their inherent vulnerabilities. Browse this white paper to see why biometric authentication may be next up in MFA.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

BIO-key International

Introduction to DNSDB Part 1: Crawl
sponsored by Farsight Security
WEBCAST: Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Farsight Security
26 - 50 of 1535 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info