Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 126 - 150 of 254Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 09, 2011

Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.

Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
By: ESET     Published Date: Sep 07, 2011

This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.

Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: ESET     Published Date: Sep 07, 2011

Learn valuable tips and techniques to fully protect your smartphone against security threats.

Tags : eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
    
By: ESET     Published Date: Sep 07, 2011

Selecting an antivirus for your small or medium business that won't slow you down.

Tags : eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
By: ESET     Published Date: Sep 07, 2011

In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.

Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
    
By: ESET     Published Date: Sep 07, 2011

This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.

Tags : eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
    
By: ESET     Published Date: Sep 07, 2011

Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.

Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
By: Absolute Software     Published Date: Sep 06, 2011

See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.

Tags : absolute, computrace, secure, tracking, security, manage, protect, application security
    
By: NetIQ     Published Date: Aug 05, 2011

In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.

Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.

Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.

Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.

Tags : verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: Google Apps     Published Date: May 16, 2011

This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.

Tags : google apps, messaging, collaboration products, information security, security policies, vulnerability management, network security, dr/bc
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.

Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
By: M86 Security     Published Date: Dec 01, 2010

This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.

Tags : m86 security, social media policy, web acceptable use policies, aups, email and web security, email security, security policies, web service security
    
By: Websense     Published Date: Sep 27, 2010

Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.

Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.