"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Security Policies

A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
Results 276 - 300 of 337Sort Results By: Published Date | Title | Company Name
White Paper Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance
    
AirDefense
White Paper Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server
    
thawte
White Paper Published By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards
    
Tripwire
White Paper Published By: NAVEX Global     Published Date: Aug 18, 2016
This guide provides an example of an acceptable use policy of computer systems at an organization.
Tags : 
policy, policy of computer systems, security, security application, application security
    
NAVEX Global
White Paper Published By: Venafi     Published Date: Aug 07, 2015
Read this paper and discover how to reduce risk of SSH key misuse and develop a strategy to manage and secure SSH keys.
Tags : 
ssh, security, reduce risk, authentication, secure ssh keys
    
Venafi
White Paper Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Cisco
Case Study Published By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : 
firehost, intelligent security, infraestructure, security, network security
    
Firehost
White Paper Published By: Dell SecureWorks     Published Date: May 28, 2013
How a CIRP Can Pay for Itself Many Times Over, and Best Practices for Creating One.
Tags : 
security policies
    
Dell SecureWorks
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
Case Study Published By: HP - Enterprise     Published Date: Jan 24, 2013
This research brief details best practices for all organizations that would like to produce more secure applications.
Tags : 
research, security, application security, vulnerability testing, software development
    
HP - Enterprise
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
Find out why these certifications matter to your organisation, and why they should be considered when protecting the information security of your mobile workforce.
Tags : 
security certifications, blackberry, mobile workforce, mobile security, blackberry
    
BlackBerry
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
Webinar Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: Distributed Management Systems     Published Date: Jul 03, 2011
White Paper describing a new approach to multi-factor authentication for the Cloud
Tags : 
mutual authentication for the cloud, authentication at application level, access control, application security, authentication
    
Distributed Management Systems
White Paper Published By: Evans Resource Group     Published Date: Jun 08, 2011
Identifying middleware security vulnerabilities in today's cyber world
Tags : 
pci dss compliance, websphere mq penetration testing, sox compliance, it governance, middleware security
    
Evans Resource Group
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity
    
The Bunker
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory