IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
176 - 200 of 1500 Matches Previous Page  |  Next Page
5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

EMM Infographic: More Productive Mobile Userst
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

EMM Vendor Report Card: How Do Mobility Providers Stack Up?
sponsored by VMware
WHITE PAPER: This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Special Report: The Cost of a Data Breach in the UK
sponsored by IBM
WHITE PAPER: This report uses data on recent cyber-breaches across the UK to explore how much money a hack would cost your business.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

IBM

Battling Security Threats from within Your Organization
sponsored by IBM
WHITE PAPER: This white paper explores the risk of insider attacks, both malicious and accidental, and gives tips on how you can secure yourself against them.
Posted: 11 Sep 2015 | Published: 30 Jun 2015

IBM

Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: This white paper describes two of the most frequently used Deep Web networks and suggests how you can stay safe from attacks that originate there.
Posted: 11 Sep 2015 | Published: 31 May 2015

IBM

Security Intelligence for the Financial Sector in 2015
sponsored by IBM
WHITE PAPER: This white paper examines the cyber-attacks the financial sector faced in 2014, discussing some of the broader trends of that year and what those trends mean for financial security going forward.
Posted: 09 Sep 2015 | Published: 30 Jun 2015

IBM

How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IBM

Indicators of Compromise
sponsored by IBM
WHITE PAPER: This white paper presents indicators of compromise to look out for and outlines a four-step process for remediating these compromises.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

IBM

Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how you can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

IBM

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014

LogicNow

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Network Encryption and its Impact on Security
sponsored by Blue Coat Systems
WHITE PAPER: This research report looks at the prevalence of network traffic encryption and decryption, examining the challenges these practices present
Posted: 16 Sep 2015 | Published: 16 Sep 2015

Blue Coat Systems

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault
176 - 200 of 1500 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement