IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
26 - 50 of 1625 Matches Previous Page  |  Next Page
The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

Building Effective Azure Active Directory Practices
sponsored by Quest
WHITE PAPER: In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Quest

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Securing Operational Technology in the Pharmaceutical and Chemical Manufacturing Industries
sponsored by Bayshore Networks
WHITE PAPER: In this white paper, gain a stronger understanding of the cyber security implications of IoT devices in pharmaceutical and chemical manufacturing. Uncover 4 key considerations for protecting against cyber threats when leveraging the IIoT.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Bayshore Networks

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

Preparing for the General Data Protection Regulation
sponsored by Fortinet, Inc.
WHITE PAPER: Gain a stronger understanding of GDPR compliance and implications for your network security.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Three Reasons a Secure Web Gateway is Vital for your Security Stance
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec

A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

The Human Side of IT Security
sponsored by Dell India
WHITE PAPER: Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".
Posted: 02 Oct 2017 | Published: 31 Dec 2014

Dell India

Do More with Complete Mobile-Cloud Security
sponsored by MobileIron
WHITE PAPER: This shift toward modern mobile-cloud technologies is forcing organizations to rethink everything from datacenter architectures to endpoint security because traditional, desktop-based security models are no longer adequate. Download this white paper to uncover some of the critical security gaps today's mobile-cloud enterprises must address.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Healthtech And Security: Sharing And Safeguarding Patient Data
sponsored by Absolute
WHITE PAPER: Learn more about how to prevent cybercriminals from accessing your patient's electronic medical records in Aberdeen Group's HealthTech study.
Posted: 19 Oct 2017 | Published: 31 Mar 2017

Absolute

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud
26 - 50 of 1625 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement