IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
176 - 200 of 1587 Matches Previous Page  |  Next Page
The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: Single sign-on (SSO) and session management, across a wide variety of sites using host-only cookies, can make theft much more difficult for cybercriminals. Discover ways to deliver broader, cross-application SSO for end-users using a central cookie provider.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: This white paper highlights the latest threat intelligence trends and how to be better equipped to protect your organization from modern cyber threats. Access now to review a systematic guide to help you understand where your organization resides on the path to mature threat intelligence.
Posted: 08 Apr 2016 | Published: 01 Mar 2016

ThreatConnect

The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Commvault

Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential
sponsored by LogicNow
WHITE PAPER: This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

LogicNow

Meaningful Measurement
sponsored by LogicNow
WHITE PAPER: This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.
Posted: 06 Apr 2016 | Published: 01 Mar 2016

LogicNow

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Be More Secure With Micro-Segmentation
sponsored by VMware
WHITE PAPER: This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to catch bad network behavior and the telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is designed to make you ask tough, direct questions of any incident response services provider to help you determine their capabilities.
Posted: 24 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

4 Steps to Developing a Proactive Security Program
sponsored by Dell SecureWorks
WHITE PAPER: Switch gears to a proactive defense. In 4 simple steps learn the discrete layers and levels needed for a security strategy that doesn't just react after the fact.
Posted: 24 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

API Security Checklist
sponsored by Axway
WHITE PAPER: This infographic shares with you 11 ways to guard your enterprise entry points. Look it over and make the changes necessary to ensure a more secure API deployment for your business.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Axway

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Security attacks on industrial control systems
sponsored by IBM
WHITE PAPER: This white paper examines the history of industrial control systems (ICS), the susceptibility of these systems to certain attacks and how the systems can be defended.
Posted: 17 Mar 2016 | Published: 31 Oct 2015

IBM
176 - 200 of 1587 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement