IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
26 - 50 of 1564 Matches Previous Page  | Next Page
Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Put Security on the Agenda: Aligning IT Security with Business Goals
sponsored by Kaspersky Lab
WHITE PAPER: Read this in-depth guide to discover new integrated systems management and mobile device management solutions that could help your organization enhance its existing security plan.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Stop Password Sprawl with SaaS Single Sign-On via Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Access this white paper to get a better understanding of the challenges to adopting SaaS applications, hidden costs of SaaS, and security issues with SaaS apps. Read on to learn more about bolstering your cloud security efforts and stopping password sprawl.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Get the Most Value Out of Network Security
sponsored by HP and Intel
WHITE PAPER: This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.
Posted: 20 Aug 2014 | Published: 01 Dec 2014

HP and Intel

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what an APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

What to look for when evaluating NGFW
sponsored by Dell Software
WHITE PAPER: This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Overcoming exploits that use advanced evasion techniques and SSL encryption
sponsored by Dell Software
WHITE PAPER: To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

MFT Center of Excellence Whitepaper
sponsored by IBM
WHITE PAPER: Many companies have implemented managed file transfer (MFT) as a way to gain control over a wide array of file transfer activities.  By employing these products, companies have remediated the inherent risk of File Transfer Protocol (FTP).
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Beyond next gen firewalls
sponsored by Dell Software
WHITE PAPER: This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Move from Chaos to Control:  Creating a Mature File Transfer Process
sponsored by IBM
WHITE PAPER: When it comes to moving files between people, business, and other processes a majority of organizations are struggling. This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Top 3 Reasons to Give Insiders a Unified Identity
sponsored by Centrify Corporation
WHITE PAPER: This white paper stresses the importance of recognizing the danger of malicious insiders and the potential for breaches caused by employee error or negligence, as well as the top 3 reasons to consider giving insiders a unified identity.
Posted: 20 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
sponsored by OpenText
WHITE PAPER: Learn how this cloud-based fax messaging solution will secure patients' information at a low cost and meets federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText
26 - 50 of 1564 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement