Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 126 - 150 of 280Sort Results By: Published Date | Title | Company Name
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
By: HP - Enterprise     Published Date: Nov 22, 2011

HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.

Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
By: ZScaler     Published Date: Nov 16, 2011

The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.

Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
By: ScriptLogic     Published Date: Nov 14, 2011

Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.

Tags : scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
By: Brainloop     Published Date: Nov 09, 2011

This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.

Tags : brainloop, security, compliance risks, sharing information, security management, data protection, access control, authentication
By: Brainloop     Published Date: Nov 09, 2011

Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.

Tags : brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
By: Brainloop     Published Date: Nov 09, 2011

This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.

Tags : brainloop, enterprise, information management, security options, technology, business, access control, authentication
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
By: Thawte     Published Date: Oct 25, 2011

This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.

Tags : ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust
By: IBM Corporation     Published Date: Oct 20, 2011

This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.

Tags : ibm, guardium, technology, data, security, privacy, risk reduction, internet security
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
By: GoToAssist     Published Date: Oct 05, 2011

It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.

Tags : citrix, technology, cloud computing, data protection, security, standards, application security, security management
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
By: IBM Corp     Published Date: Sep 23, 2011

This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.

Tags : ibm, smb, backup, technology, data recovery, archive, security management, security policies
By: IBM Corp     Published Date: Sep 23, 2011

When implementing an active archive strategy, tape has significant advantages over disk, both in cost and functionality.

Tags : ibm, technology, tape, disaster recovery, data, backup, application security, security management
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
By: Trend Micro Inc.     Published Date: Sep 21, 2011

For cybercriminals, no business is too small to exploit. Albeit being under a relatively smaller spotlight than typical enterprises, small businesses can ill afford to take the threat cybercrimes pose for granted. Myths abound regarding small businesses' security but it's time to face the facts.

Tags : trend micro, security, small business, cybercrime, cloud security, email security, internet security, security management
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.

Tags : trendlabs, trend micro, data storage, small business, technology, security solution, anti virus, security management
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.