IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
201 - 225 of 1710 Matches Previous Page  |  Next Page
Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Ransomware guide
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to defend your organization from ransomware with an advanced security model, utilizing next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Fortinet, Inc.

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Securing Data Across Your Every Environment
sponsored by Gemalto
WHITE PAPER: Learn about cryptographic keys and how they can secure your vital data. Discover the 4V's model, how the level of encryption is applied, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Why Perimeter Defenses Fail in the Face of Modern Threats
sponsored by Gemalto
WHITE PAPER: Discover what security features businesses are focusing on, why perimeter defense is not a cure-all for data breaches, and the consequences for not proofing your organization adequately for the modern threat landscape.
Posted: 13 Mar 2017 | Published: 31 May 2016

Gemalto

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Euronext Euronext’s recent IPO was a catalyst to create a coherent security environment across the new business.
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The point of security isn't just safeguarding data, mitigating loss, and providing ROI. Ultimately it's about providing peace of mind. Discover how Euronext was able to go beyond standard virus and scanning capability, reduce threat risk across their technology estate, improve threat visibility, mitigation and resolution action , and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Keeping Your Private Data Secure
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to protect your organization with various types of encryption, allowing your data to possibly stay safe even in the event of a breach.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel®
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel®

Cloud Computing Top Threats
sponsored by HPE and Intel®
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 02 Mar 2017 | Published: 29 Feb 2016

HPE and Intel®

Ransomware: Everything You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

Cisco Systems, Inc.

Embrace Risk: Secure Your Hybrid Cloud
sponsored by HPE and Intel®
WHITE PAPER: Learn how to secure your hybrid cloud by treating security as something that should be built into the IT cloud strategy and its design from the very beginning.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

HPE and Intel®

Your Guide to Spotting and Preventing Malware Infection
sponsored by Solarwinds MSP
WHITE PAPER: Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Solarwinds MSP

A Look at How Data Privacy Laws Impact Cloud Adoption in Russia
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy Russian data residency, privacy, and regulation requirements when it comes to the cloud. Discover how to avoid business disruptions by complying with the law.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Next-generation Firewall Platforms the Answer to NGFW Shortcomings?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall technology has evolved to be an essential cog in the overall cybersecurity machine, but it remains one of a multitude of puzzle pieces needed. In this ESG report uncover the NGFW shortcomings, and how to maximize their efficiency for your organization
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

The Big Bang Theory – how Mobile Device Management exploded to include devices, apps and content
sponsored by IBM
WHITE PAPER: Download this white paper to discover an enterprise mobility management platform that delivers comprehensive management with strong security controls across users, devices, apps and content to support any mobile deployment.
Posted: 07 Mar 2017 | Published: 06 Mar 2017

IBM
201 - 225 of 1710 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement