it security policies

Results 101 - 125 of 153Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
BlackBerry Cylance
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Tags : 
verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
VeriSign, Inc.
Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002
    
Information Shield
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799
    
Information Shield
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: Tripwire     Published Date: Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Tags : 
fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server, microsoft web server, security certificate, networking best practices
    
thawte
Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset
    
BlackBerry
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
    
Cisco
Published By: HP     Published Date: Apr 13, 2014
Cut the cost and complexity of managing you large, hybrid server estate. Learn how Turkcell, the leading GSM operator in Turkey, reaps benefits from server automation including reductions in the time needed to check adherence to security compliance policies from 55 hours to 20 minutes and cutting the time taken to provision virtual PCs from five days to 40 minutes.
Tags : 
hp operations orchestration, hp server automation, hp support, it case study, turkcell, bsm, business service management
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
AirDefense
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library