Security Policies White Papers

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 1 - 25 of 336Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 09, 2011

Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.

Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
By: Absolute Software     Published Date: Sep 06, 2011

See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.

Tags : absolute, computrace, secure, tracking, security, manage, protect, application security
    
By: Absolute Software     Published Date: Dec 16, 2009

In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.

Tags : absolute, it security, mobile management, project management, mobility, mobile security, remote management, application security
    
By: Acronis     Published Date: Dec 28, 2011

Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.

Tags : virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery
    
By: Adobe     Published Date: Oct 05, 2016

The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.

Tags : security, security application, cloud, cloud computing, cloud security, application security, security management, security policies
    
By: Adobe     Published Date: Aug 04, 2015

This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Aerohive     Published Date: Sep 25, 2015

Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST

Tags : wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, network security, internet security, security management
    
By: Aerohive     Published Date: Sep 25, 2015

Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST

Tags : wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, infrastructure, network security, internet security
    
By: Aerohive     Published Date: Sep 25, 2015

SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 BST

Tags : wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, network architecture, network security, internet security
    
By: Aerohive     Published Date: Sep 18, 2015

SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 AEST

Tags : wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, infrastructure, network security, internet security
    
By: Aerohive Networks     Published Date: May 06, 2015

Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging
    
By: AirDefense     Published Date: Apr 24, 2007

This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.

Tags : best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan
    
By: AirDefense     Published Date: Apr 24, 2007

This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.

Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
By: AirDefense     Published Date: Apr 24, 2007

This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.

Tags : sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
    
By: Aomega     Published Date: Nov 06, 2006

Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.

Tags : regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
By: ArborNetworks     Published Date: Feb 12, 2016

Today’s DDoS attacks are an easy way to interrupt businesses.

Tags : ddos protection, arbor networks, insegment, best practices, policies, data, application security, ddos
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
By: BlackBerry     Published Date: Oct 03, 2012

Find out why these certifications matter to your organisation, and why they should be considered when protecting the information security of your mobile workforce.

Tags : security certifications, blackberry, mobile workforce, mobile security, blackberry, information security, compliance, security management
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.

Tags : web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.