IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
101 - 125 of 1500 Matches Previous Page  |  Next Page
Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn to integrate BYOD and IT-issued devices on the same SSID, and more.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

RAND study phase 2
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper looks at how various businesses are mitigating cyber risk and how they feel they're achieving that goal.
Posted: 16 Feb 2016 | Published: 20 Jan 2016

Juniper Networks, Inc.

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

What Security Professionals Need to Know About Open Source Vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: This resource reviews the use of automated controls throughout the software lifecycle and which processes can be used to reduce open source security vulnerabilities.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Access now and learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.
Posted: 05 Feb 2016 | Published: 30 Jun 2014

BitSight

How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: File sharing is a prevalent problem on corporate networks today. Access this report and you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to other growing problems. Access this resource now and learn to identify, quantify and mitigate risk throughout your network.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Stop Data Breaches with Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Examine how privileged access management can help stop data breaches. Learn now about a 3-step process for blocking attackers' attempts to carry out crimes in your organization.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.
101 - 125 of 1500 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement