Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 251 - 275 of 336Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 11, 2009

New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.

Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
By: McAfee     Published Date: Nov 09, 2009

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."

Tags : mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam
    
By: McAfee Inc     Published Date: Oct 30, 2009

Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.

Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam, anti spam
    
By: IBM     Published Date: Oct 13, 2009

Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.

Tags : security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009

In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.

Tags : pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
    
By: McAfee Inc     Published Date: Aug 19, 2009

If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.

Tags : mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools
    
By: McAfee Inc     Published Date: Aug 19, 2009

Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.

Tags : mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools
    
By: McAfee Inc     Published Date: Aug 19, 2009

Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.

Tags : mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
By: McAfee Inc     Published Date: Aug 19, 2009

Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.

Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, email security, encryption
    
By: McAfee Inc     Published Date: Aug 19, 2009

Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.

Tags : mcafee, email protection, midsize, hackers, security, data protection, email security, encryption
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.

Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.

Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
By: IBM     Published Date: Feb 23, 2009

This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.

Tags : ibm idm, data privacy, data security, database security, confidential data, security, compliance, intrusion prevention
    
By: Information Shield     Published Date: Jan 13, 2009

Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.

Tags : information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799
    
By: HP - Enterprise     Published Date: Oct 23, 2008

Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.

Tags : fortify, application security, security risks, voting, fortify, fortify software, election process, local government
    
By: TriGeo Network Security     Published Date: Oct 03, 2008

It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.

Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
By: MessageLabs     Published Date: Aug 29, 2008

Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.

Tags : messagelabs, compliance, email policies, policy, enforce policy, email security, security policies, secure instant messaging
    
By: MX Logic     Published Date: May 21, 2008

In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.

Tags : managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections
    
By: Tripwire     Published Date: Apr 28, 2008

Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.

Tags : tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
By: Tripwire     Published Date: Mar 31, 2008

Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.

Tags : fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
    
By: Paymetric     Published Date: Dec 13, 2007

This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.

Tags : erp, pci, pci compliance, erp, pci, ompliance, sap, sap
    
By: Nemx Software Corporation     Published Date: Oct 23, 2007

Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.

Tags : email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
By: AirDefense     Published Date: Apr 24, 2007

This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.

Tags : best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan
    
By: AirDefense     Published Date: Apr 24, 2007

This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.

Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
By: AirDefense     Published Date: Apr 24, 2007

This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.

Tags : sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.