IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementMultimedia (View All Report Types)
176 - 200 of 272 Matches Previous Page  | Next Page
Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Information Governance Symposium: The Mobile Influence on Information Management Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: With the proliferation of BYOD, cloud, and social media within the enterprise, benefits like cost savings, along with improved customer relations and employee satisfaction often overshadow the cons. This classroom provides expert insights into the issues that those trends are throwing into information security and governance processes.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast
sponsored by Lumension
WEBCAST: This video covers the important steps involved with laying the groundwork for application whitelisting, how to prevent unwanted or dangerous changes while maintaining flexibility, and maintaining your environment as application, user, and other needs change. Watch and learn more.
Posted: 14 May 2013 | Premiered: May 14, 2013

Lumension

Developing Best Practices for Patch and Remediation: An In-Depth Technical Webcast
sponsored by Lumension
WEBCAST: Discover the steps you can take to improve patch management and your ability to mitigate risk. Watch today's webcast and learn why patch management is important, best practices for patch management, critical areas to address, and more.
Posted: 14 May 2013 | Premiered: May 14, 2013

Lumension

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Spam Is Annoying. Targeted Attacks Are Deadly
sponsored by Tripwire, Inc.
PODCAST: Join renowned security author Mike Cobb in this podcast as he shares valuable information regarding targeted attacks, including how they work, who's vulnerable, and how to defend yourself properly.
Posted: 27 Mar 2013 | Premiered: Mar 29, 2013

Tripwire, Inc.

IBM zSecure Compliance and Administration
sponsored by IBM
WEBCAST: View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information.
Posted: 11 Mar 2013 | Premiered: Mar 11, 2013

IBM

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Sophos EndUser Protection Overview
sponsored by Sophos, Inc.
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos, Inc.

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos, Inc.

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Integrated Security - McAfee Software and Intel vPro Technology Video
sponsored by Intel
WEBCAST: This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more.
Posted: 28 Dec 2012 | Premiered: Dec 28, 2012

Intel
176 - 200 of 272 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement