policies

Results 351 - 375 of 410Sort Results By: Published Date | Title | Company Name

Power and Cooling Guidelines for Deploying IT in Colocation Data Centers

Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains some of the causes of stranded power, cooling, and space capacity in colocation data centers and explains how high-density rack power distribution, air containment, and other practices improve availability and efficiency. Examples of acceptable use policies that address these issues are provided.
Tags : 
    
Schneider Electric

12 Recommendations for Industrial Cybersecurity

Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric

Compliance Multi-Tasking: Today's Security Priority

Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing

Eliminating Your SSL Blind Spot: The Solution to Managing and Securing HTTPS Traffic

Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing

Meeting and Exceeding PCI 1.1 Compliance Today

Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing

A Simple Guide to Penetration Testing

Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth

IT Governance, Risk and Compliance with ServiceNow

Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management, platforms, data management, business technology
    
ServiceNow

Consolidation: The Foundation for IT Business Transformation

Published By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : 
consolidation, business transformation, single interface, business applications, business benefits, it management, enterprise applications
    
ServiceNow

5 Approaches to Messaging Security: A Technical Overview of the Tradeoffs

Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security, network security, system management software, microsoft exchange, collaboration
    
Sigaba

An IT-Friendly Approach to Secure Messaging

Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba

The Business Case for Secure Messaging in the Banking Industry

Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, compliance
    
Sigaba

Asia: The Face of Innovation (A whitepaper by Harvard Business Review Analytic Services)

Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Asia is well positioned to continue its role as an innovation incubator and an important market for new products and services. Harvard Business Review articulates how the three key factors of People, Policies and Resources contribute to Asia’s innovation ecosystems, and shares how companies like Intel, Micron, Medtronic have been innovating for Asia from Singapore.
Tags : 
    
Singapore Economic Development Board

Which Mobile Device Is the Most Secure?

Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos

E-Policy Best Practices Guide

Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Tags : 
spyware, security policy, security policies, policy based management, email security, secure im, st. bernard, st bernard, epolicy, anti spyware, secure instant messaging
    
St Bernard Software

Five tactics for compensation managers to shift the business

Published By: Success Factors     Published Date: Aug 19, 2014
With news of economic recovery reaching employees’ ears, compensation managers will have to face the challenge of creating compelling compensation solutions through proactively benchmarking, updating policies with the current state of the business, avoiding inefficient data analysis methods, visualizing reports and trends, and responding to the business
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors

Online Training Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks

Not Just Words: Enforce Your Email and Web Acceptable Usage Policies

Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity, email security, policy based management, web service security
    
Symantec.cloud

Legal Risks of uncontrolled email and web

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering, web service security, human resources services, workforce management software, employee monitoring software
    
Symantec.cloud

Top Ten Web Threats and how to eliminate

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department.
Tags : 
messagelabs, security safeguard, symantec hosted services, web threat, malware, employee monitoring, productivity, anti spam, anti spyware, anti virus, internet security, employee monitoring software
    
Symantec.cloud

Securing Data in the Cloud

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security, policy based management, data protection, data center design and management
    
Symantec.cloud

New! Protect the Data: Best Practices for Security Policies

Published By: Symantec.cloud     Published Date: Sep 01, 2010
This white paper gives best practices for creating security policies and includes a set of recommended policy components.
Tags : 
messagelabs us, data protection, security policies, social networking, information security, policy management, auditing, compliance, internet security, policy based management, security management
    
Symantec.cloud

Managing Your Wireless Workforce

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy, mobile computing, mobile data systems, mobile workers, wireless communications
    
Symantec.cloud

Mobility, Employees & Policies: SaaS Protects Your Distributed Workforce

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : 
messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging, mobile workers, wireless messaging, information management, workforce management software
    
Symantec.cloud

Securing Your Mobile Workforce Locking Down Data in Your Environment

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce, mobile computing, mobile data systems, mobile workers, wireless communications, workforce management, database development, human resources services, workforce management software
    
Symantec.cloud
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.