IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
101 - 125 of 1550 Matches Previous Page  |  Next Page
Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Case Study How the University of Wisconsin-Madison Achieved Large-Scale Data Center Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how the University of Wisconsin-Madison was able to adapt its WAN design to accommodate the increasing volume of data without sacrificing the high level of security the research facilities required.
Posted: 13 Apr 2015 | Published: 26 Sep 2014

Gigamon

Case Study: How University of Glasgow Scaled its Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how one IDS infrastructure solution helped the IT professionals at the University of Glasgow upgrade their limited network for easier monitoring and increased protection.
Posted: 13 Apr 2015 | Published: 27 Jun 2014

Gigamon

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Managing Java Security in the Enterprise
sponsored by Browsium
WHITE PAPER: Enabling Java apps for the internet has resulted in a variety of compatibility and security issues due to JRE incompatibilities, as well as unlimited threat vectors on the web. This paper covers two primary challenges directly related to ongoing Java security threats. Read on to find detailed guidance for managing Java security in the enterprise.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Browsium

How the Financial Industry can Prepare for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: The financial services industry needs to evolve to meet the cybercrime of today. In this white paper, learn more about what these crimes look like and how to stop them.
Posted: 10 Apr 2015 | Published: 31 Mar 2014

Hewlett-Packard Limited

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

The State of Threat Intelligence in 2015
sponsored by AlienVault
WHITE PAPER: In this research report, discover how many organizations have successfully implemented threat intelligence and what benefits they're experiencing.
Posted: 08 Apr 2015 | Published: 28 Feb 2015

AlienVault

Critical Factors in Endpoint Security
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 08 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. and Intel®

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Mobile App Reputation and Risk Management for Network Security
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper, you'll discover a new solution to application risk management that provides detailed behavioral intelligence about mobile apps.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Case Study: Global Media Company Gains Stronger App Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explains how one cloud-based service helped a global media and technology company regain full visibility and control of its mobile app perimeter, allowing the enterprise to more effectively assess the risk of its mobile apps and maintain control of its mobile footprint.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

3 Questions to ask Endpoint Security Vendors
sponsored by Great Bay
WHITE PAPER: Access this white paper now to discover how you can put your endpoint security vendor to the test by asking 3 key questions.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what security precautions need to be taken when using cloud services.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Rackspace

8 Ways Better Endpoint Visibility Can Knock Out Network Headaches
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll learn how to streamline multiple IT initiatives with an endpoint profiling approach.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Great Bay

Self-Assessment: What Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault
101 - 125 of 1550 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement