IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Multimedia (View All Report Types)
1 - 25 of 220 Matches Previous Page  |  Next Page
Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: In this podcast join experts Brent Midwood and Kevin Beaver as they discuss best practices in approaching and addressing ransomware. Gain valuable insight into what drives ransomware developers (hint: the profits are enormous), the developing trends in ransomware deployment, and more.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Join Forrester Senior Analyst Heidi Shey as she breaks down the digital transformation and key requirements for success in regards to the information that fuels this digital future. Also delve into the importance and benefits of secure information exchange, as well as what to look for in secure information exchange solutions.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Implementing App Security Efficacy and Centralized, Intelligent Threat Management
sponsored by Citrix
VIDEO: This brief video explores how to implement app security efficacy for centralized threat management both on-premise and in the cloud. Discover how to leverage a web app firewall, defend against threats on the app, infrastructure, and network levels, create stronger identity and access management, and enable real-time threat analytics.
Posted: 17 Feb 2017 | Premiered: 10 Feb 2017

Citrix

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Timing the Perfect ADC Vendor Refresh
sponsored by A10 Networks
WEBCAST: Today's market is all about the app, and consumers care about one thing: accessing them from anywhere, anytime, and above all - securely. Learn how a smart application delivery controller vendor refresh will improve performance, security, management and support..
Posted: 14 Feb 2017 | Premiered: Oct 28, 2016

A10 Networks

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

Cybersecurity Essentials for 2017
sponsored by Neustar
VIDEO: In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.
Posted: 30 Jan 2017 | Premiered: 25 Jan 2017

Neustar

Respond to Threats Faster and More Effectively Than Ever
sponsored by ServiceNow
WEBCAST: Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.
Posted: 30 Jan 2017 | Premiered: Jan 30, 2017

ServiceNow

Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017
sponsored by Neustar
VIDEO: Discover if your current DNS strategy stacks up to the next generation of internet demands. Learn why it makes sense to have a backup DNS provider, what IoT insecurities threaten your business, and more.
Posted: 27 Jan 2017 | Premiered: 20 Jan 2017

Neustar

Why Mobile Devices are the Biggest Enterprise Security Threat
sponsored by BlackBerry
WEBCAST: Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.
Posted: 23 Jan 2017 | Premiered: Oct 31, 2016

BlackBerry

Data Security for Small to Midsize Businesses
sponsored by Hewlett-Packard Enterprise
WEBCAST: Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more.
Posted: 18 Jan 2017 | Premiered: May 30, 2016

Hewlett-Packard Enterprise

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Turn IAM from a Roadblock into a Business Enabler
sponsored by IBM
VIDEO: Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.
Posted: 07 Dec 2016 | Premiered: 30 Nov 2016

IBM

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

Solving the DLP Puzzle: Tips for a Successful Deployment
sponsored by Intel Security
WEBCAST: Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is. Check out these tips and techniques to ease common DLP pain points, and explore migration use cases.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault
1 - 25 of 220 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement