IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
101 - 125 of 1605 Matches Previous Page  |  Next Page
Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides key areas of inquiry for your board to consider. Access now and learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture for greater organizational operations overall.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Fraud Protection Doesn't Have to Be an Uphill Battle
sponsored by IBM
WHITE PAPER: Access this white paper and find out how you can reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Why Application Delivery Matters in the Digital Economy
sponsored by Citrix
WHITE PAPER: Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.
Posted: 20 Apr 2016 | Published: 30 Sep 2015

Citrix

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to gain insider black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

A New Approach to Data Center Security
sponsored by VMware, Inc.
WHITE PAPER: In the following brief resource, learn how businesses are deepening their data center security strategies and effectiveness through micro-segmentation. View now and learn how this strategy enables security from the base level and can tie security directly into workloads as well as automatically provision policies when needed most.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

VMware, Inc.

The Mobile Enterprise: Is Ease of Use Overriding Security?
sponsored by BlackBerry
WHITE PAPER: Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.
Posted: 15 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Ditching Legacy Tokens
sponsored by BlackBerry
WHITE PAPER: While legacy tokens still hold 70% of the user authentication market, Gartner predicts a shift towards the phone as a token. Discover why legacy tokens are falling short and how mobile authentication will retain all the security of legacy solutions while reducing costs and simplifying the end-user experience.
Posted: 14 Apr 2016 | Published: 31 Mar 2016

BlackBerry

The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

Actionable Threat Intelligence: Logging and Reporting
sponsored by Palo Alto Networks
WHITE PAPER: This resource highlights the capabilities of one network security tool that makes critical information visible and rapidly actionable. It showcases the utility of a highly visual, interactive, and customizable network security monitoring interface.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: Single sign-on (SSO) and session management, across a wide variety of sites using host-only cookies, can make theft much more difficult for cybercriminals. Discover ways to deliver broader, cross-application SSO for end-users using a central cookie provider.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow
101 - 125 of 1605 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement