Home
 > Research and Reports > White Papers > Best Practices for Implementing a Security Process

Best Practices for Implementing a Security Process

Source: Symantec
Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But without a solid process backing up the technology, organizations will still be susceptible to emerging threats. Learn more about aligning security processes with the latest security technologies to create a barrier against today’s most insidious threats.


Featured publications:

Fixed Asset Inventory: A Guide to Getting Started
Source: Sage Implementing a fixed asset inventory solution and performing proper accounting of assets can save time and money, reduce theft, improve planning and budgeting, eliminate “ghost assets,” and help an organization recover after a natural disaster. However, the importance of tracking and managing fixed assets such as land, buildings, transportation, and manufacturing equipment is often overlooked. This white paper discusses best practices for fixed asset inventory management and suggests tips for implementing a successful inventory process, including how to create an asset inventory process, implement a label and scanning solution for tracking of assets, establish an accurate baseline of fixed assets, and design a “go-forward” strategy for maintaining an asset inventory. Read More...
Succession Management Is More Than Just a Plan: Identifying, Developing, and Retaining Talent for Critical Roles
Source: SuccessFactors Companies need to expand their succession management practices to stay competitive within evolving markets. These firms can take a new approach to succession management by implementing an ongoing and dynamic process that's linked to development, holistically integrated with other talent initiatives, and uses technology to manage the complexity. Read More...
Best Practices: How to Engage Business Leaders in Succession
Source: SuccessFactors Effective succession management requires ownership by line-of-business leaders. Learn how HR can engage leaders to use the talent review process to identify, develop, and advance talent for tomorrow’s needs, preparing the organization to navigate the expected as well as the unexpected. Read More...


You may also be interested in these related documents:

Best Practices in Authentication and Access Control: Comparing 802.1x to the Nevis LAN Security Approach
Source: Nevis Networks, Inc. The 802.1x protocol should be the obvious choice when implementing user-based authentication in enterprise networks. So why doesn’t everyone use it? Because it doesn’t give a complete solution for authentication and policy requirements, even when it’s integrated with a network access control (NAC) solution. But if you integrate 802.1x with a local area network (LAN) secure switch, you get a more complete secure solution. Read More...
Network Security Best Practices: Competitive Analysis
Source: CipherOptics When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services for Internet protocol (IP) networks are emerging that enable new levels of scalability and manageability—while remaining completely transparent to the network. By applying this type of system, you build an optimal framework for future security applications. Read More...
E-Policy Best Practices
Source: EdgeWave This business guide by ePolicy Institute and EdgeWave Inc. provides best-practices guidelines for developing and implementing effective workplace e-policies, and in the process, creating clean, compliant, safe and secure electronic communications that are less likely to trigger a workplace lawsuit, regulatory investigation, security breach, or other electronic disaster. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.