IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementMultimedia (View All Report Types)
1 - 25 of 238 Matches Previous Page  | Next Page
How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
PODCAST: Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Posted: 18 Apr 2014 | Premiered: Apr 11, 2014

Trend Micro

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

What Businesses Need to Know About Cyber Security
sponsored by Lumension
WEBCAST: Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world.
Posted: 17 Apr 2014 | Premiered: Apr 17, 2014

Lumension

Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them
sponsored by Lumension
WEBCAST: This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
WEBCAST: This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments.
Posted: 14 Apr 2014 | Premiered: Apr 9, 2014

Trend Micro

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Mobile Application Security Chaos
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: 08 Apr 2014 | Premiered: Apr 8, 2014

Hewlett-Packard Company

Strength Through Integration: Securing the Mobile Enterprise
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top security concerns for the growing mobile landscape and what you can do to best prevent cyber-attacks on your mobile devices.
Posted: 04 Apr 2014 | Premiered: 22 Jan 2014

Cisco Systems, Inc.

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

How to Stop Online Payment Fraud Without Adding Friction
sponsored by ThreatMetrix
WEBCAST: This in-depth webcast explores many current methods used to detect online payment fraud in real-time and how you can be more transparent for your customers.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2014

ThreatMetrix

Rackspace and NetIQ - A Success Story
sponsored by NetIQ
WEBCAST: This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2013

NetIQ

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Security and Compliance Best Practices for SaaS Providers
sponsored by CloudPassage
WEBCAST: This webcast reviews the latest trends in software architectures and delivery models, along with the issues software-as-a-service (SaaS) providers must take into consideration when developing security measures.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

CloudPassage

Enterprise Strategy Group Improving Incident Response with NetCitadel
sponsored by NetCitadel
WEBCAST: In this video, Enterprise Strategy Group's Jon Oltsik looks at the weakness of detection-focused security strategies doomed to failure. Responding to threats is what really keeps firms out of the headlines, and organizations need to prepare properly.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetCitadel

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage

Enterprise Mobility Management: Going from Good To Great
sponsored by CA Technologies.
WEBCAST: This expert webcast thoroughly examines enterprise mobility management (EMM) and its central role in the BYOD age. Join expert Jack Madden as he discusses the ins-and-outs of effective management and what you can do to ensure a successful, efficient, and productive mobile environment.
Posted: 27 Mar 2014 | Premiered: Mar 24, 2014

CA Technologies.

Rethinking Enterprise Mobility: The Way It Should Be
sponsored by CA Technologies.
WEBCAST: In this expert webcast, mobility expert Jack Madden takes and in-depth look at mobile management, discussing the critical role management plays in all aspects of the mobile environment and examining some of the most effective strategies and solutions are available to you.
Posted: 27 Mar 2014 | Premiered: Mar 24, 2014

CA Technologies.

Podcast: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
PODCAST: This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 26 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM
1 - 25 of 238 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement