IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
126 - 150 of 1508 Matches Previous Page  | Next Page
Mitigating Multiple DDoS Attack Vectors
sponsored by F5 Networks
WHITE PAPER: View this infographic to understand where DDoS are derived from, how to detect them, and how to mitigate multiple attack vectors.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

F5 Networks

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

The Evolution of the Enterprise and Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This informative paper examines how the enterprise has evolved and how your security needs to evolve with it. Read on to find out more about the current state of enterprise security.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Move Forward With Mobile and Cloud, Securely
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


What Does It Take to Score 100% on the NSS Data Center Firewall Test?
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Leading the Charge in Emerging MSSPs
sponsored by Alert Logic
WHITE PAPER: In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Posted: 19 Jun 2014 | Published: 08 Jan 2013

Alert Logic

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Top 10 Review: Voltage SecureMail Cloud Standard
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper highlights a secure email platform that scored 10/10 in reviews on recipient experience and administration tools
Posted: 17 Jun 2014 | Published: 31 Dec 2013

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


NSS Labs Breach Detection System Product Analysis – FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
WHITE PAPER: This white paper highlights the benefits of centralizing data on a single cloud platform to better protect today's decentralized IT infrastructure.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Box

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper offers 5 valuable steps to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Leveraging Privileged Identity Governance to Improve Security Posture
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource takes an in-depth look at insider attacks, and discusses how privileged identity governance can help you identify and deal with potential threats from within your own environment.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.

Evaluating File Sync and Share Solutions
sponsored by Dropbox for Business
WHITE PAPER: This resource offers a 12-question checklist to go through when evaluating file sync and share vendors.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
126 - 150 of 1508 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement