IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
226 - 250 of 1609 Matches Previous Page  |  Next Page
Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016


Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Five Essential Elements for an Effective Mobile Security Strategy
sponsored by VMware, Inc.
WHITE PAPER: In this trend brief, you'll review the essential elements of building a mobile security strategy. Learn about ways to construct your strategy and protect data, devices, and more.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

VMware, Inc.

Prevent Insider Threats
sponsored by Exabeam
WHITE PAPER: Not all threats exist outside your organization. Insider threats could be potentially worse if they go undetected—leaking critical information. So how do you distinguish an insider attack, and more importantly, how do you stop them? Find out in the following exclusive white paper.
Posted: 02 Jun 2016 | Published: 02 Jun 2016


Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: This informational report from Forrester addresses where security awareness is falling short and how you can revamp your security awareness programs to empower employees to protect themselves and your organization from phishing attacks. Learn how to help users protect themselves and your enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015


Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: Explore the effectiveness of real-time malware protection for financial institutions, banks, and any online business with financial transactions. See how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016


Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016


CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016


Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016


E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Securing Productivity in the Borderless Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016


Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014


Safeguard Protected Health Information
sponsored by Citrix
WHITE PAPER: Securing protected health information is a major priority for healthcare organizations and a major challenge since file sharing is such an important aspect of the industry. Learn how you can prevent information leaks while increasing productivity and collaboration.
Posted: 12 May 2016 | Published: 30 Jun 2015


Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

ShareFile Enterprise: Provide Industry-leading Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015


Not all Next-Gen Firewalls are created equal
sponsored by Barracuda Networks
WHITE PAPER: Learn how to centrally control every aspect of your firewalls to maintain even data flow and security throughout your network. Access now learn to more about a secure communication backbone that provides all the deep packet inspection and threat mitigation you need.
Posted: 09 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Leveraging Threat Intelligence In Incident Response
sponsored by Intel Security
WHITE PAPER: The ultimate goal of any incident management process is to contain the damage of attacks. This requires you to investigate and find the root causes of attacks faster. How? Find out how to more effectively safeguard your network from attack, monitor for indicators of compromise, and streamline your response if an attack is (inevitably) successful.
Posted: 06 May 2016 | Published: 21 Aug 2014

Intel Security

Defining Security for 3 Types of Cloud
sponsored by Intel Security
WHITE PAPER: With different cloud models available (public, private, hybrid) there's a lot of confusion around how to secure them and what methods work best for each model. No matter how far along you are with the cloud or how simple or complex your cloud deployment, access this white paper now so you can proactively prepare to repel inevitable attacks.
Posted: 06 May 2016 | Published: 29 Apr 2016

Intel Security

The What, the Why, and the How of Hybrid Cloud
sponsored by Intel Security
WHITE PAPER: The shift to cloud is all-but inevitable, so grasp the opportunity. This white paper dives into what hybrid cloud is, why it's beneficial, and how to take advantage of it. Access now to take a look at some of the barriers to public-cloud adoption while we cut through unnecessary technicalities to get to the heart of the matter.
Posted: 06 May 2016 | Published: 27 Apr 2016

Intel Security

Advancing Cyber-Security Measures Inside
sponsored by VMware
WHITE PAPER: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 05 May 2016 | Published: 01 Apr 2016


Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015


Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016


Orchestrating Security in the Cloud
sponsored by Intel Security
WHITE PAPER: The following report takes an in-depth look at the SANS Technology Institute's survey results about cloud computing to reveal where hidden vulnerabilities lie and what must happen to avoid falling prey to attack.
Posted: 06 May 2016 | Published: 30 Sep 2015

Intel Security

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

226 - 250 of 1609 Matches Previous Page    8 9 10 11 12 13    Next Page
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement