IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
201 - 225 of 1642 Matches Previous Page  |  Next Page
Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Fortinet’s Data Center Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about fast-growing trends and gain new perspective on established trends that are affecting your data center security right now. Gain solid insight into how mobility and BYOD requires faster speeds but risks unauthorized access, server virtualization is becoming the norm but carries risks, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

The Advanced Persistent Threat Lifecycle
sponsored by LogRhythm, Inc.
WHITE PAPER: Learn each phase of the advanced persistent threat (APT) lifecycle and discover insight and examples of the log trail that is often left behind at each phase.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

LogRhythm, Inc.

Addressing Your Cloud Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Ease your move to the cloud with the advice offered in this white paper, including an overview of the main classes of cloud architecture, the security consideration of moving to the cloud, key challenges of public and private clouds, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

On-Demand Cloud Security for Microsoft Azure
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the long and the short of on-demand cloud security for Microsoft Azure, BYOL models, single-pane-of-glass cloud orchestration, and more. Gain knowledge of how to keep your organization safe in today's threat landscape.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Automatically Scale Cloud Security with Ease on Amazon Web Services
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to protect your physical, virtual, and cloud workloads across your entire network.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Advanced Security at Scale in the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this thorough guide to the cloud, learn how to properly scale security in the public cloud, secure workloads in AWS, comply with the AWS shared-responsibility security model, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Securing the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to secure your enterprise's presence on AWS and maximize your use of the public cloud. Access now to gain an in-depth understanding of how to protect both the public and hybrid cloud during and after transitioning from a traditional "brick and mortar" data center.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Fortinet, Inc.

The 2016 Economics of Web Scraping Report
sponsored by Distil Networks
WHITE PAPER: Access this report to learn how web scraper bots are a threat to your online content, how exactly these malicious bots are costing you money, and most importantly, what you can do to protect your content – and your revenue.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Distil Networks

The Rise of Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover eye-opening statistics about the ever-increasing ransomware problems against today's enterprises. Learn what types of attacks are taking place, where these attacks are taking place and what you can do to best protect your organization from financial and brand name disaster.
Posted: 01 Nov 2016 | Published: 01 Sep 2016

Barracuda Networks

The Ultimate Guide to Preventing Account Takeover
sponsored by Distil Networks
WHITE PAPER: 46% of internet traffic is composed of bots at any given time performing automated tasks or mimicking human behavior. Access this resource to uncover the 7 steps to mitigate account take over bots, how to under their purpose and how to stop them in their tracks.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Distil Networks

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This e-book reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Guarding information from ransomware attacks should be a top priority for all organizations. Access this white paper to discover 4 best practices to protect and recover from ransomware attacks with confidence.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

SECURITY INVESTIGATION, DETECTION & RAPID RESPONSE WITH SPLUNK ENTERPRISE
sponsored by Splunk
WHITE PAPER: In this technical white paper, learn how to strengthen your overall security posture by simply interacting and exploring your data to find evidence of an infection or a breach. Learn how to use Splunk to search for keywords, terms or values to gain critical insights into your security posture.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Splunk

DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

MobileIron

Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM
201 - 225 of 1642 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement