Standards  >  

Security Standards

RSS Feed   
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 

Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Standards Reports
1 - 25 of 452 Matches Previous Page  |  Next Page
Detect Threats before they Seriously Damage your Business
sponsored by BCM One - Verizon
RESEARCH CONTENT: Find out how managed security services can help bolster your security posture by analyzing data from your security devices and flagging the threats that pose the greatest risk to your organization so that you can resolve them before they have a negative impact.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

BCM One - Verizon

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Arctic Wolf

Cutting BitLocker Complexity and Helpdesk Headaches
sponsored by WinMagic
WHITE PAPER: Find out how you can streamline BitLocker deployments and cut helpdesk time spent on security tasks like password resets by as much as 75% with tools like the SecureDoc Enterprise Server (SES).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

WinMagic

A Guide to Endpoint Privilege Management Security Fundamentals
sponsored by Avecto Ltd
WHITE PAPER: Learn what endpoint privilege management is and how it helps defend against malware threats. Plus, get tips on how to deploy endpoint privilege management technology that fits into your existing security systems.
Posted: 09 Aug 2018 | Published: 08 Aug 2018


Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

MASERGY

Fighting Account Takeover (ATO) Fraud Attacks
sponsored by Riskified
WHITE PAPER: In this guide, get a rundown of account takeover (ATO) attacks – from how fraudsters get the credentials they need to access accounts to their modus operandi once they're in and what you can do after detecting the threat.
Posted: 03 Aug 2018 | Published: 30 Apr 2018

Riskified

Data protection: A business imperative
sponsored by IBM
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

10 Reasons Enterprises are Moving Security to the Cloud
sponsored by Zscaler
WHITE PAPER: Organizations have already recognized the value in moving apps to the cloud – now they're looking to migrate their security as well. Learn about the Zscaler Security Cloud and discover 10 reasons enterprises have started moving security to the cloud.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Microsegmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: This white paper explores how to add a second layer of defense behind perimeter firewalls with microsegmentation. Learn how organizations like those in the education sector can take a new approach to data center security that's designed to halt the spread of malware.
Posted: 30 Jul 2018 | Published: 31 May 2016

VMware

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

2018 Cloud Security Report
sponsored by Ixia - Keysight
RESEARCH CONTENT: This research report explores how the security ecosystem is evolving in 2018 to tackle the challenges of an expanding attack surface. Get insights on all things cloud security – from the changing motivations and behaviors of threat actors to changes in the privacy landscape – and explore the report's 5 key findings.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

Deploy Silent Security to Protect Identities and Future-Proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 25 Jul 2018 | Published: 30 Nov 2017

IBM

Deploy Silent Security to Protect Identities and future-proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 24 Jul 2018 | Published: 30 Nov 2017

IBM

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM

The State of Security Automation Architectures: Consolidated Key Findings
sponsored by Juniper Networks
RESEARCH CONTENT: Learn about the growing importance of a security automation architecture to cybersecurity by exploring some of the Ponemon Institute's key findings about the role of automation in incident response, security analytics, SIEM, and more.
Posted: 17 Jul 2018 | Published: 30 Apr 2018

Juniper Networks

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure
1 - 25 of 452 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement