Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 1 - 25 of 242Sort Results By: Published Date | Title | Company Name
By: Acronis     Published Date: Dec 28, 2011

Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.

Tags : virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery
    
By: McAfee     Published Date: Feb 06, 2013

Protect systems from unknown, advanced persistent threats with centrally managed whitelisting

Tags : application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection, access control, anti spam
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: Bit9     Published Date: Jul 15, 2012

Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.

Tags : bit9, cyber, technology, it management, security, access control, security management, security policies
    
By: Bit9     Published Date: Sep 29, 2012

Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.

Tags : bit9, technology, online, security, online threats, online security, access control, security management
    
By: Bit9     Published Date: Jul 15, 2012

Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.

Tags : bit9, cyber, technology, it management, security, security management, security policies, data protection
    
By: Lumension     Published Date: Jan 22, 2013

Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus
    
By: C2C Systems, Inc.     Published Date: Mar 15, 2007

Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.

Tags : email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
By: AirDefense     Published Date: Apr 24, 2007

This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.

Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012

Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.

Tags : navisite, technology, cloud comptuing, security, risk management, security management, business security, application security
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Lumension     Published Date: Jan 22, 2013

Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
By: McAfee     Published Date: Feb 06, 2013

It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.

Tags : rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
By: McAfee     Published Date: Mar 08, 2013

Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.

Tags : database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.

Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication
    
By: NAVEX Global     Published Date: Mar 04, 2014

Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.

Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
By: Symantec.cloud     Published Date: Feb 12, 2010

Understand the legal issues if you do not conduct a risk assessment before creating your AUP.

Tags : messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.

Tags : mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention, access control
    
By: Bit9     Published Date: Jul 15, 2012

Download this case study and learn how an international communications company locks down their domain controllers with Bit9's trust-based application control solution and are now protected against todays modern cyber threats.

Tags : bit9, cyber, technology, it management, security, access control, application security, security management
    
By: Bit9     Published Date: Jan 17, 2012

Download this case study to see how one financial technology provider used Bit9 Parity Server solution to lockdown their environment, find the infected machines and prevent further damage.

Tags : bit9, technology, security, server protection, security policy, data protection, internet security, intrusion prevention
    
By: Netwrix     Published Date: Apr 22, 2008

At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.

Tags : netwrix, graduate, graduation, education, college, university, school, inactive accounts
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.