IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
126 - 150 of 1702 Matches Previous Page  |  Next Page
Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 12 Jun 2017 | Published: 30 Sep 2016

TrendMicro

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Dealing with Ransomware, Business Email Compromise and Spearphishing
sponsored by PhishMe
WHITE PAPER: Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

PhishMe

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Rapid7

What a Software Defined Perimeter Means for Your Network Security
sponsored by Cryptzone
WHITE PAPER: Learn how the new zero-trust Software-Defined Perimeter security model overcomes limitations of older perimeter-based Network Access Control (NAC) solutions. Learn how your organization can secure access to on-premises, hybrid and cloud-based resources.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Cryptzone

GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec

Gain Deeper Insights into Your System with this Vulnerability Management System
sponsored by Rapid7
WHITE PAPER: In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Rapid7

Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Rapid7

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate
126 - 150 of 1702 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement