IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Multimedia (View All Report Types)
26 - 50 of 272 Matches Previous Page  |  Next Page
Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Unified Security for Today's Enterprise
sponsored by BitDefender
VIDEO: Watch this video to explore a unified approach to security that addresses the needs of virtual, physical, and mobile devices in your environment.
Posted: 06 Oct 2015 | Premiered: 03 Jun 2013


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast introduces the concept of social threat intelligence (STI) and explains why it has the potential to reshape security.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


The Benefits of a Virtual Security Operations Center
sponsored by IBM
VIDEO: In this video, you'll discover how a virtual security operations center can provide you with all the tools you need to fight today's advanced threats.
Posted: 21 Sep 2015 | Premiered: 12 Apr 2013


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. View now to learn how becoming a technology partner with Citrix can expand your business reach.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

How to Turn Data into Actionable Threat Intelligence
sponsored by BrightPoint Security
VIDEO: This brief video presents a way to automate the analysis of threat intelligence, turning it into data you can use to enhance your security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

What is Threat Intelligence?
sponsored by BrightPoint Security
VIDEO: In this brief video, security expert Rich Reybok discusses how threat intelligence can be practically leveraged to enhance an organization's security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015


Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.
26 - 50 of 272 Matches Previous Page    1 2 3 4 5    Next Page
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement