Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 126 - 150 of 286Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
By: NetApp and VMware     Published Date: Jan 09, 2012

Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.

Tags : netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection, green mountain
By: Acronis     Published Date: Dec 28, 2011

Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.

Tags : virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery
By: NetIQ     Published Date: Dec 08, 2011

Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.

Tags : automating, webcast, security, vulnerabilities, resources, productivity, access control, application security
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.

Tags : mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention, access control
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
By: HP - Enterprise     Published Date: Nov 22, 2011

HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.

Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
By: ZScaler     Published Date: Nov 16, 2011

The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.

Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
By: ScriptLogic     Published Date: Nov 14, 2011

Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.

Tags : scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
By: Brainloop     Published Date: Nov 09, 2011

This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.

Tags : brainloop, security, compliance risks, sharing information, security management, data protection, access control, authentication
By: Brainloop     Published Date: Nov 09, 2011

Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.

Tags : brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
By: Brainloop     Published Date: Nov 09, 2011

This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.

Tags : brainloop, enterprise, information management, security options, technology, business, access control, authentication
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
By: Thawte     Published Date: Oct 25, 2011

This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.

Tags : ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust
By: IBM Corporation     Published Date: Oct 20, 2011

This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.

Tags : ibm, guardium, technology, data, security, privacy, risk reduction, internet security
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
By: GoToAssist     Published Date: Oct 05, 2011

It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.

Tags : citrix, technology, cloud computing, data protection, security, standards, application security, security management
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
By: IBM Corp     Published Date: Sep 23, 2011

This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.

Tags : ibm, smb, backup, technology, data recovery, archive, security management, security policies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.