IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
101 - 125 of 1629 Matches Previous Page  |  Next Page
Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: Discover how to build a layer of protection inside and around your apps. Learn how to control access, monitor activity, clean up input to your apps, and more.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

The Bot Problem: Managing Bot Traffic in the Travel Industry
sponsored by Akamai
WHITE PAPER: In this white paper discover how bots affect search visibility, aggregation, and on-site performance, and more. Learn what can be done to respond to these bots and achieve the goals for your site.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Akamai

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

An End-to-End Framework For Mobile Security
sponsored by BlackBerry
WHITE PAPER: Discover how to secure corporate data on the cloud in a BYOD environment. Learn not only about the changing landscape of mobile security, but also the growing trends that make securing enterprise data on these devices more vital than ever.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

BlackBerry

How CAME Group Protects Endpoints from Targeted Cyber-Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Working with a trusted IT partner, CAME Group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palo Alto Networks

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. You'll also explore the emerging role of sandboxing as a powerful weapon in cyber security.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Check Point Software Technologies Ltd.

A Stronger Silver Lining in the Cloud
sponsored by Palerra Inc.
WHITE PAPER: In this time-saving infographic, discover key figures on cloud usage among enterprises and IT professionals. Learn which services are being used, the true cost of a data breach, why security is lacking on the cloud, and what is being done about it.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

How to Conquer the Biggest AWS Adoption Challenges
sponsored by Palerra Inc.
WHITE PAPER: Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Armor

A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016

Exabeam

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Guide to Making The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

BT

Combating APT in a New Way
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to advanced persistent threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Exabeam

Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER: Discover how your enterprise can put the OODA Loop (Observe, Orient, Decide, Act) philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breaches. Learn to observe a crisis from all angles, review events in the context of other network activity to establish a timeline, quickly implement remediation, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

AlienVault

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Four Components of a Solid Mobile App Strategy
sponsored by IBM
WHITE PAPER: Discover the components that every mobile application strategy needs to succeed: discovery, scalability, sustainability, and security. Learn not only the importance of these four, but also how to attain them to truly benefit your organization.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM
101 - 125 of 1629 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement