IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
26 - 50 of 1597 Matches Previous Page  |  Next Page
The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

Market Trends: Automation and Integration Critical to Application Security Tool Adoption
sponsored by IBM
WHITE PAPER: Take a closer look at this market trend report to reveal findings from Gartner research surveys regarding organizations' use of DevOps and security.
Posted: 20 Sep 2017 | Published: 17 Jan 2017

IBM

Encrypted Traffic Analytics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about the current state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor.
Posted: 20 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

How You can Secure the Use of Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Symantec

Evolution of Incident Response
sponsored by IBM Resilient
WHITE PAPER: A recent survey revealed that data breach and data theft outranked natural and manmade disasters and IT system failures as the largest threat to an organization's reputation. The old days of incident response, will no longer suffice to keep your organization safe. Learn how IR has evolved and how you can improve yours.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

Orchestrated Response: A Game-Changing Strategy
sponsored by IBM Resilient
WHITE PAPER: Uncover how organizations have improved their security posture by using advanced security automation and orchestration strategies to alleviate cyber threats.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Secure and Manage Mobile Devices, Desktops, Apps and Content
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover how to secure corporate data, drive employee productivity, and enable business innovation with an EMM system that meets both user demands and IT security requirements.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

MobileIron

eFax Corporate Unmasked: The Top 10 Fax Essential Questions Answered
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, find the answers for the top 10 questions to asked during eFax Corporate Webinar series over the past year.
Posted: 12 Sep 2017 | Published: 20 Jun 2017

J2 Cloud Services

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

2017 Threat Landscape Report
sponsored by Fortinet, Inc.
WHITE PAPER: Review what we've learned from the threats and exploitations attacking systems and networks across the globe in 2017 as a means for gaining critical insights into how you can better prepare your network for the cyber attacks of the future.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

So You've Been Breached: What to Do Next
sponsored by Armor
WHITE PAPER: When your system is breached by a malicious attack, it's no time to panic, it's time to act. Inside, discover the 5 steps you need to take to stop the exfiltration of data and return your system to normal operations with as minimal damage as possible.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Armor

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

Next Generation Firewall Comparative Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report examines 11 next generation firewalls, evaluating for overall security, performance, and TCO. Take a look to see which providers lead the pack, which ones to avoid, and more.
Posted: 20 Sep 2017 | Published: 06 Jun 2017

Cisco Systems, Inc.
26 - 50 of 1597 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement