IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
126 - 150 of 1563 Matches Previous Page  |  Next Page
Think Like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. This SlashGuide white paper helps you understand advanced threats and how to defend against them.
Posted: 06 May 2015 | Published: 31 Jan 2015

Hewlett-Packard Company

Survey Shows Plenty of Room for Improvement in IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: A new survey from IDG Research Services reveals that most organizations lack confidence in their security defenses. Read this report to learn why, and how you can build security that's worth having confidence in.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Red Tiger Security: Printer and Embedded Device Security
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

Hewlett-Packard Company

IDC Analyst Connection: How New Attitudes Toward and Approaches to Security Will Help SMBs Reach the Next Level of Business Performance
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Raymond Boggs, Vice President, Small/Medium Business Research, IDC, shares his insights and advice on behalf of firms looking to refine their security practices for maximum effectiveness.
Posted: 01 May 2015 | Published: 31 Mar 2015

Hewlett-Packard Company

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

Balancing Security and Mobility with the Right MDM Solution
sponsored by IBM
WHITE PAPER: Access this white paper now and discover how you can embrace IT consumerization and provide all of the security you need without sacrificing the benefits of mobility. Read on to learn how you can optimize your mobile strategy.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks
sponsored by Alcatel-Lucent
WHITE PAPER: Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Alcatel-Lucent

The hidden costs of self-signed SSL certificates
sponsored by Symantec
WHITE PAPER: Read this white paper to discover a detailed breakdown of the real total cost of ownership of a self-sign SSL certificate.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Symantec

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

One Solution to Mobile Enterprise Management
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn how one mobile management solution enables your company to support secure and productive mobile business.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

EMM Challenges: Balancing the Needs of IT and End Users
sponsored by BlackBerry
WHITE PAPER: This white paper explains how you can start balancing IT needs with what employees want, without all of the complex infrastructures and security concerns you might expect. Read on to discover the 3 key features you should look for in an EMM strategy.
Posted: 16 Apr 2015 | Published: 26 Dec 2014

BlackBerry

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

The Paradigm Shift in Cybersecurity
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand and why organizations need to ramp up security measures regardless of their current status.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.
126 - 150 of 1563 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement