IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
151 - 175 of 1500 Matches Previous Page  |  Next Page
The Curious Case of API Security: Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This resource delves into the top threats facing APIs, exploring how these attacks are carried out and how you can thwart them. Read on to learn how to keep your APIs secure.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Axway

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

Identity and Access Management Users Maximize Their ROI
sponsored by ForgeRock
WHITE PAPER: Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

Ten Top Tips on Keeping Your Business Secure
sponsored by Sage (UK) Limited
WHITE PAPER: From incident response to user education, this white paper lists the top ten steps you need to take to keep your business secure.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Sage (UK) Limited

Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

AlienVault

A New Guide To Evaluating MSSPs
sponsored by UnitedLex
WHITE PAPER: Ensure that an MSSP can overcome the top 5 obstacles of mitigating advanced attacks by studying this valuable evaluation guide. View now and learn the 8 questions you need to ask prospective MSSPs.
Posted: 21 Oct 2015 | Published: 07 Oct 2015

UnitedLex

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: Access this white paper that discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

The Essential Guide to Building a Strong MDM Foundation
sponsored by IBM MaaS360
WHITE PAPER: In this essential guide, you will learn the about 12 best practices for implementing mobile device management in your business. Read on here to start introducing these MDM strategies, taking your organization to the next level.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

IBM MaaS360

Control Scan
sponsored by Unisys
WHITE PAPER: Access this white paper now to get the full results of ControlScan's test of one vendor's top security solution. Discover the strengths and weaknesses of this platform and discover if it is a viable option for your organization.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Unisys

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Special Report: Best Practices for Incident Response
sponsored by Intel Security
WHITE PAPER: The SANS 2015 Incident Response survey results reveals an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Intel Security

Research Report: Attack Detection and Incident Response
sponsored by Intel Security
WHITE PAPER: This report examines organizations' security strategies, cyber-attack environments, and IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills, and poor security analytics capabilities.
Posted: 20 Oct 2015 | Published: 30 Apr 2015

Intel Security

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode
151 - 175 of 1500 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement