Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 1 - 25 of 280Sort Results By:Published Date | Title | Company Name
By: Venafi     Published Date: Jul 27, 2015

Read the solution brief to close SSH security gaps and protect your business.

Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This paper evaluates the marketís readiness for Zero Trust concepts and technologies, based on Forresterís own market data and a custom study of the same audience.

Tags : intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

In this report, EMA highlights specific examples of the ways in which these converged security systems put todayís more advanced capabilities to work in practical application.

Tags : network management, network security, enterprise management, security technology, converged security systems, application protocols, network architecture, compliance
    
By: IBM     Published Date: Jul 15, 2015

This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.

Tags : intelligence technology, security management, threat intelligence, intelligence protection, security solutions, compliance, internet security, intrusion detection
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
By: CDW     Published Date: Jul 08, 2015

Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.

Tags : security, data protection, dlp, data breach, vulnerability management, security management, security policies, data loss prevention
    
By: Cisco     Published Date: Jun 29, 2015

Ronís team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.

Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation, network architecture
    
By: Cisco     Published Date: Jun 24, 2015

This paper explores the main benefits of Cisco ACI Security.

Tags : cisco aci security, csico, virtualization, integration, security, application integration, data center, ynified
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: Cisco     Published Date: May 15, 2015

The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco, firewalls
    
By: Cisco     Published Date: May 14, 2015

The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
By: Aerohive Networks     Published Date: May 06, 2015

Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging
    
By: Worldpay     Published Date: Apr 29, 2015

In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, thereís no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.

Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
    
By: Document Cloud for Enterprise     Published Date: Apr 23, 2015

This white paper explores several factors relating to the legality of e-signatures in various applications.

Tags : esign law, e-signatures, electronic signatures, digital signatures, e-signature solutions, esign act, law makes digital signatures legal, authentication
    
By: AllClearID     Published Date: Apr 23, 2015

A Study of Actual Payouts for Covered Data Breaches. **This white paper was published by NetDiligence**

Tags : network security, security policies, disaster recovery, compliance, business continuity, internet security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.