Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 26 - 50 of 243Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Feb 06, 2013

There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.

Tags : threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
By: McAfee     Published Date: Feb 06, 2013

Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz

Tags : desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting
    
By: McAfee     Published Date: Feb 06, 2013

Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.

Tags : endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
By: McAfee     Published Date: Feb 06, 2013

It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.

Tags : rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
By: McAfee     Published Date: Feb 06, 2013

Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.

Tags : rootkit, deep defender, application control, change control, black listing, white listing, security compliance, trusted memory services layer
    
By: McAfee     Published Date: Feb 06, 2013

Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.

Tags : vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 06, 2013

Insight and control to secure your dynamic cloud environment at every infrastructure layer

Tags : cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement, application security, data security, security compliance
    
By: McAfee     Published Date: Feb 06, 2013

This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Tags : security management platform, siem, log management, security management 2.0, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Feb 06, 2013

Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus
    
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Symantec     Published Date: Jan 31, 2013

Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.

Tags : endpoint protection, security, overview, access control, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Jan 31, 2013

AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.

Tags : endpoint protection, security, performance test, comparison, access control, anti spam, anti spyware, encryption
    
By: McAfee     Published Date: Jan 28, 2013

Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls, business continuity
    
By: HP - Enterprise     Published Date: Jan 24, 2013

The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.

Tags : mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This report details the current state of the security management market and what to expect moving forward.

Tags : security, testing, security controls, security management, tools, siem, access control, anti spam
    
By: HP - Enterprise     Published Date: Jan 24, 2013

Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.

Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.

Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware
    
By: McAfee     Published Date: Jan 23, 2013

Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.

Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus
    
By: Lumension     Published Date: Jan 22, 2013

Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.

Tags : best practices, devices control, encryption, security, business continuity, access control, anti spam, anti spyware
    
By: Lumension     Published Date: Jan 18, 2013

Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.

Tags : security, network security, cyber attacks, access control, anti spam, anti spyware, anti virus, application security
    
By: Lumension     Published Date: Jan 18, 2013

News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.

Tags : security, network security, network protection, data security, data protection, cyber attack, case study, encryption
    
By: Trend Micro     Published Date: Oct 12, 2012

The consumerization and mobilization of enterprise IT is a real, irreversible, and unstoppable movement that needs immediate attention and innovative solutions.

Tags : information technology, security, trend micro, internet security, security management, security policies
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.