IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
201 - 225 of 1501 Matches Previous Page  | Next Page
The Purview™ Solution–Integration With SIEM
sponsored by Extreme Networks
WHITE PAPER: This whitepaper explores one unique network monitoring and management system that allows for easy integration with your SIEM platform.
Posted: 23 May 2014 | Published: 23 May 2014

Extreme Networks

Not Living Up to Expectations? Use Cases and Solutions for Common SCCM Issues
sponsored by Promisec
WHITE PAPER: This informative guide outlines 5 use cases and solutions for common SCCM issues.
Posted: 23 May 2014 | Published: 23 May 2014

Promisec

Globalscape® EFT Platform: Complete Visibility Over File Transfer
sponsored by GlobalScape
WHITE PAPER: This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Five Things To Do After An Attack
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

How to Cost-effectively Satisfy PCI DSS Auditors
sponsored by Promisec
WHITE PAPER: This white paper offers a cost-effective, agentless PCI compliance solution to help you avoid critical data breaches.
Posted: 22 May 2014 | Published: 22 May 2014

Promisec

Automated Solution's for SANS Critical Controls for Effective Cyber Defense
sponsored by Promisec
WHITE PAPER: This informative guide explores the top 5 critical controls for effective cybersecurity and how they will help ensure security for your organization.
Posted: 22 May 2014 | Published: 22 May 2014

Promisec

Cyber Risk Report 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this recent cyber risk report for key findings to help you prepare security methods for the latest threats.
Posted: 21 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

The ROI of Automated Agentless Endpoint Management
sponsored by Promisec
WHITE PAPER: This informative guide explores the impact of endpoint monitoring and control solutions on organizations.
Posted: 21 May 2014 | Published: 21 May 2014

Promisec

Overcoming Today's Compliance and Security Data-Related Challenges
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges.
Posted: 21 May 2014 | Published: 21 May 2014

Hexis Cyber Solutions Inc

Bringing Your IT Platforms Together with Managed File Transfer
sponsored by GlobalScape
WHITE PAPER: This brief resource highlights the ability of managed file transfer (MFT) in securing and consolidating diverse platform environments.
Posted: 20 May 2014 | Published: 20 May 2014

GlobalScape

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Mobile Data Security Finding the Balance
sponsored by IBM
WHITE PAPER: Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient.
Posted: 16 May 2014 | Published: 30 Apr 2013

IBM

Protecting Your Mid-Size Business from Today’s Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper takes a look at the importance of securing your business from a midmarket perspective.
Posted: 16 May 2014 | Published: 16 May 2014

Hewlett-Packard Company

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Vulnerabilities, Attacks, Data Breaches: Which is most important?
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers leading advice on how to leverage top vulnerability, attack, and data breach reports to help enhance your security strategies.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

RSA Security Operations Management (SecOps) in Action
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014

RSA, The Security Division of EMC

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Meeting Demand of High Availability with Advanced Data Protection
sponsored by IBM
WHITE PAPER: This white paper features a series of data protection solutions that help businesses meet the demands for always-on availability for applications while keeping sensitive information secure.
Posted: 19 May 2014 | Published: 31 Jan 2014

IBM

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

The Surprising Affordability of Today’s Cloud Archive
sponsored by Infrascale
WHITE PAPER: This resource explains why cloud data archive is a more secure and reliable backup option over legacy tape solutions for MSPs.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale
201 - 225 of 1501 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement