security policy

Results 101 - 125 of 156Sort Results By: Published Date | Title | Company Name
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security, security, application security, encryption, password management
    
LockLizard
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control
    
IBM Software
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
    
McAfee
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
Nemx Software Corporation
Published By: Venafi     Published Date: Mar 26, 2015
Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation. This leads to errors and missed system updates that result in policy violations and costly business interruptions. You can solve these issues with a PKI refresh that delivers automated key and certificate security and management.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security
    
Venafi
Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion
    
Webroot UK
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
    
CDW
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy
    
IBM
Published By: MobileIron     Published Date: Jul 31, 2015
Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees for productivity, collaboration, CRM, ERP, analytics, and industry-specific business processes. Office 365 might be the productivity solution, but the IT team needs a central platform that can provide a consistent security and policy framework across all the mobile apps the organization will deploy both today and tomorrow. This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt
    
GFI
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
Cisco
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
IT can do everything in its power to secure the company's confidential documents, yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, compliance, user compliance, security, access control, security management, security policies
    
Brainloop
Published By: Gigamon     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices, networking, security, it management
    
CDW-Trend Micro
Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt
    
Sunbelt Software
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: ScriptLogic     Published Date: Jan 11, 2012
This white paper looks at what really needs to be done and how to enable your organization to be license efficient.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.