Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 126 - 150 of 267Sort Results By: Published Date | Title | Company Name
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: GoToAssist     Published Date: Oct 05, 2011

It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.

Tags : citrix, technology, cloud computing, data protection, security, standards, application security, security management
    
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
By: IBM Corp     Published Date: Sep 23, 2011

This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.

Tags : ibm, smb, backup, technology, data recovery, archive, security management, security policies
    
By: IBM Corp     Published Date: Sep 23, 2011

When implementing an active archive strategy, tape has significant advantages over disk, both in cost and functionality.

Tags : ibm, technology, tape, disaster recovery, data, backup, application security, security management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

For cybercriminals, no business is too small to exploit. Albeit being under a relatively smaller spotlight than typical enterprises, small businesses can ill afford to take the threat cybercrimes pose for granted. Myths abound regarding small businesses' security but it's time to face the facts.

Tags : trend micro, security, small business, cybercrime, cloud security, email security, internet security, security management
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.

Tags : trendlabs, trend micro, data storage, small business, technology, security solution, anti virus, security management
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: Absolute Software     Published Date: Sep 09, 2011

Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.

Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
By: ESET     Published Date: Sep 07, 2011

This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.

Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: ESET     Published Date: Sep 07, 2011

Learn valuable tips and techniques to fully protect your smartphone against security threats.

Tags : eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
    
By: ESET     Published Date: Sep 07, 2011

Selecting an antivirus for your small or medium business that won't slow you down.

Tags : eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
By: ESET     Published Date: Sep 07, 2011

In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.

Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
    
By: ESET     Published Date: Sep 07, 2011

This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.

Tags : eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
    
By: ESET     Published Date: Sep 07, 2011

Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.

Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
By: Absolute Software     Published Date: Sep 06, 2011

See how Absolute Manage Mobile Device Management allows organizations to remotely manage their AppleŽ iOS devices (iPhoneŽ, iPodŽ Touch, iPadT).

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.

Tags : absolute, computrace, secure, tracking, security, manage, protect, application security
    
By: NetIQ     Published Date: Aug 05, 2011

In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.

Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.