IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
26 - 50 of 1571 Matches Previous Page  |  Next Page
Perspective: The art and science of value realization in the cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

DDoS Attack: Smoke Screen or Smoke Signal?
sponsored by Arbor Networks
WHITE PAPER: Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.
Posted: 17 Aug 2016 | Published: 08 Apr 2016

Arbor Networks

An Enterprise Security Program and Architecture to Support Business Drivers
sponsored by Above Security
WHITE PAPER: This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

The Bot Problem: Managing Bot Traffic in the Travel Industry
sponsored by Akamai
WHITE PAPER: In this white paper discover how bots affect search visibility, aggregation, and on-site performance, and more. Learn what can be done to respond to these bots and achieve the goals for your site.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Akamai

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

An End-to-End Framework For Mobile Security
sponsored by BlackBerry
WHITE PAPER: Discover how to secure corporate data on the cloud in a BYOD environment. Learn not only about the changing landscape of mobile security, but also the growing trends that make securing enterprise data on these devices more vital than ever.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

BlackBerry

How CAME Group Protects Endpoints from Targeted Cyber-Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Working with a trusted IT partner, CAME Group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palo Alto Networks

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Exposing the Unknown: How Sanboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Check Point Software Technologies Ltd.

A Stronger Silver Lining in the Cloud
sponsored by Palerra Inc.
WHITE PAPER: In this time-saving infographic, discover key figures on cloud usage among enterprises and IT professionals. Learn which services are being used, the true cost of a data breach, why security is lacking on the cloud, and what is being done about it.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

How to Conquer the Biggest AWS Adoption Challenges
sponsored by Palerra Inc.
WHITE PAPER: Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Armor

A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Discover how the mobile threat landscape is changing as well as staying the same. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016

Exabeam

Four Components of a Solid Mobile App Strategy
sponsored by IBM
WHITE PAPER: Discover the components that every mobile application strategy needs to succeed: discovery, scalability, sustainability, and security. Learn not only the importance of these four, but also how to attain them to truly benefit your organization.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk
26 - 50 of 1571 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement