IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
126 - 150 of 1666 Matches Previous Page  |  Next Page
Application Security Assessment
sponsored by Kaspersky Lab
WHITE PAPER: Access this overview of an app security assessment that uncovers and mitigates vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

Choosing The Right Two-Factor Authentication Solution for Healthcare
sponsored by Imprivata
WHITE PAPER: Learn why using two-factor authentication puts your healthcare organization miles ahead in terms of protecting your electronic records.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

Imprivata

Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

SECURITY INVESTIGATION, DETECTION & RAPID RESPONSE WITH SPLUNK ENTERPRISE
sponsored by Splunk
WHITE PAPER: In this technical white paper, learn how to strengthen your overall security posture by simply interacting and exploring your data to find evidence of an infection or a breach. Learn how to use Splunk to search for keywords, terms or values to gain critical insights into your security posture.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Splunk

Game Over: 3 Scenarios Where Compliance Isn't Enough
sponsored by Armor
WHITE PAPER: Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

Best Practices For Multi-Factor Authentication
sponsored by Synchronoss
WHITE PAPER: Learn how multi-factor authentication bolsters security and is exponentially more secure than passwords alone. Discover the fundamental problem with solely relying on passwords, how to choose a cloud service that meets your industry's guidelines, and more.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Synchronoss

An MSP's Guide to selling IT Security
sponsored by LogicNow
WHITE PAPER: By enhancing your security capabilities, you can add additional value to your offerings. Learn how to evolve into a Managed Security Service Provider (MSSP) and enable various security strategies that complement each other.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

Inside The 6 Principal Layers of The Cloud Security Stack
sponsored by Armor
WHITE PAPER: If only 33% of IT professionals believe that their organization's cloud security is up to par, what do you think about yours? Access now to gain valuable insight into cloud security strategies and tools to save your enterprise money and the hassle of a breach.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Armor

Transformative Technology in Document Security
sponsored by HP
WHITE PAPER: This IDC Insight reviews how 3rd platform technologies such as mobile, cloud, and big data play a role in technology suppliers expanding their print security service offerings to prevent hackers from entering enterprise networks via print devices.
Posted: 24 Oct 2016 | Published: 29 May 2015

HP

AWS Cloud: Improve Your Security Posture
sponsored by Armor
WHITE PAPER: Learn how to instantly defend your AWS operating systems with the right tools, processes, threat intelligence, and analysis without the burden of cumbersome management or expensive deployments.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

Securing and Monitoring Access to Office 365
sponsored by Imperva
WHITE PAPER: Discover how to best secure and monitor your Office 365 users to fully realize its benefits. Learn why Office 365 is quickly becoming a target for many hackers as well as the challenges involved with securing it.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Imperva

DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Guide to PCI Compliance in the Cloud
sponsored by Armor
WHITE PAPER: Discover how to achieve complete control of your IT environment when you pursue PCI DSS compliance on your DIY cloud security environment. Learn the basics of compensating controls, gain an understanding of the latest version of PCI DSS, and more.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

4 Features Your Security Strategy Needs in a Virtual Environment
sponsored by Kaspersky Lab
WHITE PAPER: This report discusses four features that a virtual desktop infrastructure (VDI) security solution must include. Discover ways to maintain the benefits of virtualization while also meeting the unique needs of VDI.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Kaspersky Lab

Ultimate Guide to Multi-Vector DDoS Protection
sponsored by A10 Networks
WHITE PAPER: Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.
Posted: 21 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Combat the Most Common Forms of Phishing Attacks
sponsored by Agari
WHITE PAPER: Learn the behaviors of, and remedies for, 6 of the top phishing attacks that are targeting enterprises in ever increasing numbers.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Agari

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

Provide the Ideal Frontline Firewall Defense
sponsored by Barracuda Networks
WHITE PAPER: Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Barracuda Networks

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

IBM

10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

Fragmentation: The "Silent Killer" of Your Security Management Program
sponsored by ThreatConnect
WHITE PAPER: Look at the issues caused by security fragmentation and uncover a path towards enhanced security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

ThreatConnect

Barracuda NextGen Firewall Advanced Threat Detection
sponsored by Barracuda Networks
WHITE PAPER: Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Barracuda Networks
126 - 150 of 1666 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement