IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
151 - 175 of 1666 Matches Previous Page  |  Next Page
Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Microsoft

Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013

Trustwave

Best-of-Breed Next-Generation Security For the Mid-Market
sponsored by Barracuda Networks
WHITE PAPER: Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Leverage Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: Discover a real-time web protection strategy that can target modern malware threats. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Enhance AWS Security with Splunk Solutions
sponsored by Splunk
WHITE PAPER: In this white paper, uncover why security should not be amongst chief concerns when adopting cloud services. Read on to find out how when paired with the right analytics tool, cloud services can be the foundation for a relentless defense against the future threat landscape.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

Splunk

Unify Security Intelligence to Create a Strong Threat Detection and Prevention Ecosystem
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper by Dr. G.W. Ray Davidson, discover how you can unify your security intelligence processes through automation and integration. Learn how you can develop a classification scheme to determine what data is most important to protect, expand this risk scoring to all areas of your enterprise, and more.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

LogRhythm, Inc.

Ransomware and Phishing: How to Avoid Falling Victim to These Threats
sponsored by Barracuda Networks
WHITE PAPER: Discover how to gain complete visibility, control and protection against malware, spyware, phishing, spear phishing and ransomware threats. Learn how to adequately secure all of your threat vectors and proactively stay ahead of the latest threats with an intelligent backend infrastructure.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

The Importance of Proactive Risk Management in Email Security
sponsored by Agari
WHITE PAPER: Business email compromise (BEC) scams are becoming more sophisticated. Access this executive brief to keep ahead of the curve and learn how to mitigate the risks of the newest breed of BEC attacks while gaining deep insight into your email ecosystem.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

Agari

Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

MSSP Checklist
sponsored by AlienVault
WHITE PAPER: Discover how to become the best MSSP you can be through this checklist. It's advised that you modify it to fit your individual work style. The services you offer and your experience will influence the creation and the ongoing edits of this checklist.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

AlienVault

5 Ways to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

Commvault

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Protecting Critical Assets from Unauthorized Access
sponsored by IBM
WHITE PAPER: Learn how identity and access management is at the heart of every cybersecurity strategy. Uncover how to safeguard mobile, cloud and social access; prevent advanced insider threats; simplify cloud integrations and identity silos; and more.
Posted: 12 Oct 2016 | Published: 31 Jul 2016

IBM

Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Five Important Truths About Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper discover 5 steps to meeting digital workspace security objectives, and taking a people-centric approach to security that doesn't come at the cost of productivity or user experience.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

RES Software

The Three Essential Elements of Next-Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: With an overabundance of security solutions being touted as "next gen," how do you know what really is an innovative endpoint protection product? Discover an explanation of the essential elements of next-gen endpoint protection, a list of the top questions to ask potential vendors, and more.
Posted: 07 Oct 2016 | Published: 07 Oct 2016

CrowdStrike

10 Reasons You Should Consider a Career in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: If you're already in the IT field, shifting gears to focus on cybersecurity is not as much of a transition as you might first think. This white paper highlights 10 key reasons you should consider a career in cybersecurity.
Posted: 07 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Cybersecurity During a Merger: CrowdStrike on Key Risks and Due Diligence
sponsored by CrowdStrike
WHITE PAPER: In this interview with CrowdStrike's Steve Chabinsky, learn key risk factors such as cybersecurity that organizations encounter during the merger and acquisition due diligence process and how to avoid them.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

ThreatConnect

The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

CrowdStrike

5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

Appthority

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Neustar

No Downtime, No Problem. Silverstring Protects Customers and Their Data
sponsored by Neustar
WHITE PAPER: Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.
Posted: 10 Oct 2016 | Published: 30 Sep 2016

Neustar
151 - 175 of 1666 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement