Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 26 - 50 of 242Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 08, 2013

Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.

Tags : real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam
    
By: McAfee     Published Date: Mar 07, 2013

McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.

Tags : securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
By: McAfee     Published Date: Mar 07, 2013

Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.

Tags : pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 12, 2013

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : mcafee, av-test, deep defender, rootkits, detection, network security, email security, intrusion detection
    
By: McAfee     Published Date: Feb 06, 2013

Users who take work with them everywhere unknowingly jeopardize networks and systems.

Tags : windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
By: McAfee     Published Date: Feb 06, 2013

How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.

Tags : fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
By: McAfee     Published Date: Feb 06, 2013

Protect systems from unknown, advanced persistent threats with centrally managed whitelisting

Tags : application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection, access control, anti spam
    
By: McAfee     Published Date: Feb 06, 2013

There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.

Tags : threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
By: McAfee     Published Date: Feb 06, 2013

Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz

Tags : desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting
    
By: McAfee     Published Date: Feb 06, 2013

Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.

Tags : endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
By: McAfee     Published Date: Feb 06, 2013

It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.

Tags : rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
By: McAfee     Published Date: Feb 06, 2013

Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.

Tags : rootkit, deep defender, application control, change control, black listing, white listing, security compliance, trusted memory services layer
    
By: McAfee     Published Date: Feb 06, 2013

Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.

Tags : vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 06, 2013

Insight and control to secure your dynamic cloud environment at every infrastructure layer

Tags : cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement, application security, data security, security compliance
    
By: McAfee     Published Date: Feb 06, 2013

This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Tags : security management platform, siem, log management, security management 2.0, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Feb 06, 2013

Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus
    
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Symantec     Published Date: Jan 31, 2013

Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.

Tags : endpoint protection, security, overview, access control, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Jan 31, 2013

AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.

Tags : endpoint protection, security, performance test, comparison, access control, anti spam, anti spyware, encryption
    
By: McAfee     Published Date: Jan 28, 2013

Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls, business continuity
    
By: HP - Enterprise     Published Date: Jan 24, 2013

The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.

Tags : mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This report details the current state of the security management market and what to expect moving forward.

Tags : security, testing, security controls, security management, tools, siem, access control, anti spam
    
By: HP - Enterprise     Published Date: Jan 24, 2013

Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.

Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.

Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware
    
By: McAfee     Published Date: Jan 23, 2013

Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.

Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.