Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 126 - 150 of 242Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 06, 2011

Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.

Tags : absolute, computrace, secure, tracking, security, manage, protect, application security
    
By: NetIQ     Published Date: Aug 05, 2011

In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.

Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.

Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.

Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.

Tags : verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: Google Apps     Published Date: May 16, 2011

This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.

Tags : google apps, messaging, collaboration products, information security, security policies, vulnerability management, network security, dr/bc
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.

Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
By: M86 Security     Published Date: Dec 01, 2010

This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.

Tags : m86 security, social media policy, web acceptable use policies, aups, email and web security, email security, security policies, web service security
    
By: Websense     Published Date: Sep 27, 2010

Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.

Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
By: Websense     Published Date: Apr 16, 2010

Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.

Tags : websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
    
By: Epicor     Published Date: Feb 22, 2010

This white paper covers how to effectively managing the upcoming transition for US registered companies to file their financial statements in International Financial Reporting Standards (IFRS) format.

Tags : epicor, ifrs, sec, enterprise resource planning, erp, general ledger, accounting, security
    
By: Websense     Published Date: Feb 16, 2010

This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.

Tags : tco, websense, web security, osterman, hybrid, security solutions, security management, security policies
    
By: Symantec.cloud     Published Date: Feb 12, 2010

Understand the legal issues if you do not conduct a risk assessment before creating your AUP.

Tags : messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
By: McAfee     Published Date: Dec 09, 2009

Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.

Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
    
By: McAfee Inc     Published Date: Nov 16, 2009

With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.

Tags : mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
By: McAfee     Published Date: Nov 09, 2009

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."

Tags : mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam
    
By: McAfee Inc     Published Date: Oct 30, 2009

Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.

Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam, anti spam
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.