IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
101 - 125 of 1611 Matches Previous Page  | Next Page
10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Tackle Inside Threats with Privileged Access Management
sponsored by Gemalto
WHITE PAPER: Download this exclusive whitepaper now to uncover how to manage privileged access and determine who should have what type of access. Also find stats about insider security breaches and more.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

How to Manage Privileged Access in the Enterprise
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper covers five key tips for managing privileged access in the enterprise.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Beyond the Firewall: Protection and Performance
sponsored by Akamai Technologies
WHITE PAPER: Access this exclusive paper that explains how to achieve greater visibility into the global threat landscape and create a more proactive resilient defense against cyberattackers. Additionally, find out how to address the challenge of a changing defense budget in the next few years.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Web Security: Protecting the Heart of Your Business
sponsored by Akamai Technologies
WHITE PAPER: In this study conducted by Forrester Research, Inc., learn how organizations in the US and Europe understand the impact of cyberattacks and specifically the role DDoS and web application attacks have on their business.
Posted: 11 Nov 2014 | Published: 31 Aug 2014

Akamai Technologies

Improving DDoS Protection
sponsored by Akamai Technologies
WHITE PAPER: Unfortunately for many companies, the records-setting DDoS attack campaigns that occurred Q3 of 2014 caused massive, irrevocable damage. So when it comes down to it, what do you need to know to improve DDoS protection? Consult the following white paper to find out now.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Akamai's (State of the Internet) / Security
sponsored by Akamai Technologies
WHITE PAPER: The following white paper explores the explosion of DDoS attacks that took place Q3 2014 and examines the various methods used, potential ways to thwart future attacks, and much more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

BYOD: A Complex Environment to Deploy Secure Solutions
sponsored by Gemalto
WHITE PAPER: This white paper gives an overview of a number of problems associated with mobile security, as well as several potential solutions. Read on to learn how to maximize security for mobile endpoints within your enterprise, and how to successfully implement these solutions in a rapidly changing mobile enterprise market.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Gemalto

The Importance of Improving and Adapting Web Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores CSOs' opinions and strategies regarding web security; the challenges that currently stand in the way of web security deployment within many organizations; and the options that businesses have for working through these critical issues.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

Streamline Windows 7 Migration with this Endpoint Manager
sponsored by IBM
WHITE PAPER: Check out this valuable whitepaper now to learn about an endpoint management solution that can consolidate your systems management infrastructure, automate your processes, clear out inefficiencies, and much more.
Posted: 11 Nov 2014 | Published: 11 Jul 2014

IBM

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

IBM Endpoint Manager, Built on BigFix Technology
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how you can take control of your heterogeneous computing devices with effective endpoint management.
Posted: 11 Nov 2014 | Published: 09 May 2012

IBM

IBM Endpoint Manager for Software Use Analysis
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores an endpoint management solution that provides important insight into what you own and how often software is being used to support better planning, budgeting, and vendor license compliance.
Posted: 11 Nov 2014 | Published: 14 Oct 2014

IBM

Minimize Cheque Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at one endpoint management solution that helped apply, enforce, and manage endpoint security and risk. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

TaaSera

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

Your Critical Missing Security Vantage Point
sponsored by ObserveIT
WHITE PAPER: This white paper explains why user activity monitoring is critical in order to address the problem associated with users.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT
101 - 125 of 1611 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement