IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
76 - 100 of 1041 Matches Previous Page  |  Next Page
SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Future Of The Soc Soc People: Skills Not Tiers
sponsored by Chronicle
WHITE PAPER: We’ve entered a new phase of the digital revolution. Network edges are extended to a point of entanglement with the physical world, expanding hybrid cloud and an increasingly multi-cloud core—all of which necessitates a rethinking of the SOC workforce model. Access this white paper to see the prospective focus on SOC talent.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Chronicle

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

Application Security Stats Flash
sponsored by WhiteHat Security
ANALYST REPORT: API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

WhiteHat Security

THE TRUE COST OF A DDoS ATTACK
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Cloud networks: Shifting into hyperdrive
sponsored by Barracuda
RESEARCH CONTENT: As organizations continue to radically transform and modernize their infrastructures, public cloud usage continues to soar. However, the evolution of public cloud isn’t without its own set of operational constraints and security concerns. Read this research report for a deep dive into modern public cloud networks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Barracuda

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Endpoint Prevention and Response: Comparative Report
sponsored by Palo Alto Networks
ANALYST REPORT: Businesses are using endpoint prevention and response (EPR) to detect, prevent, analyze and respond to targeted attacks such as advanced persistent threats (ATPs). In this AV Comparatives report, study a comparison of 9 different EPR platforms and examine whether they took an active or passive response to threats.
Posted: 22 Jan 2021 | Published: 17 Dec 2020

Palo Alto Networks

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Magic Quadrant For IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Risktech 100 2021
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

The Forrester Wave: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security
76 - 100 of 1041 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences