IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
51 - 75 of 1671 Matches Previous Page  |  Next Page
Biometrics: A Modern Method Of Authentication
sponsored by Comarch
WHITE PAPER: Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Comarch

Giving IT a Secure, Common Platform for Extending the Data Center to the Cloud
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: IT must tailor security tools to protect public and hybrid cloud environments, allowing the enterprise to confidently extend their data center applications and workflows to the cloud and connect them securely. Access this white paper and uncover secure, dedicated cloud computing services.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Check Point Software Technologies Ltd.

Evaluation Checklist: Managed Security Services Provider
sponsored by Trustwave
WHITE PAPER: Discover what you should expect out of your next Managed Security Service Provider (MSSP) with this evaluation checklist. This tool will help you compare and contrast potential MSSP's so you can best decide which one best suits your needs
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

5 Ways to Achieve Big Data Protection
sponsored by Commvault
WHITE PAPER: Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Commvault

Deliver Instant Web Experiences While Protecting Your Applications
sponsored by Akamai
WHITE PAPER: In this white paper learn how to meet the rising expectations of the always connected, globally-distributed end-users by delivering faster website and mobile app responses. Discover how your enterprise can defend against all types of DDoS and web application attacks at a high accuracy, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

The Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Learn about web application firewalls (WAFs) and how to apply them effectively such as considering whether a WAF is appropriate for your web application security, how to baseline your existing WAF against a set of recommended criteria, generate ideas for extending an existing WAF and improving web application security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

Overview: Modern Data Center Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Learn how to address these challenges with comprehensive and dynamic security for data centers. Uncover key capabilities of comprehensive threat prevention.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Check Point Software Technologies Ltd.

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

7 Ways to Simplify Security Intelligence so Your Team Can Work Smarter, Not Harder
sponsored by LogRhythm, Inc.
WHITE PAPER: With automated response, your analysts can review the situation before countermeasures are executed, while at the same time greatly reducing mean time to respond. In this resource, you'll uncover 7 best practices for getting security intelligence technology to work harder, so people can work smarter.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

LogRhythm, Inc.

앱 및 데스크탑 가상화를 통해 보안을 강화해야 하는 10가지 이유
sponsored by Citrix
WHITE PAPER: 데스크탑 가상화를 통해 정보 보안을 강화해야 하는 10가지 이유 [백서] 보안 및 규제 준수를 보장하면서 사용자가 요구하는 유연성과 생산성을 제공합니다. 보안 제품을 추가로 구축하여 보안을 강화하라는 말이 아닙니다. 근본적으로 안전한 가상 아키텍처로 전환함으로써 앱, 데스크탑 및 데이터 딜리버리 방식을 변화시키면 됩니다. 시트릭스의 앱 및 데스크탑 가상화 기술은 안전한 앱, 데스크탑 및 데이터 딜리버리를 통해 직원 생산성을 유지하면서도 데이터 센터에 모든 것을 안전하게 보관할 수 있도록 지원합니다. 백서를 읽고 시트릭스가 위험 노출 없이 액세스할 수 있도록 지원하는 방법에 대해 확인하십시오.
Posted: 10 Nov 2016 | Published: 11 Nov 2016

Citrix

Definitive Guide to Security Intelligence and Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

LogRhythm, Inc.

Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

Proofpoint, Inc.

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how to provide industry-leading performance, scalability, resiliency, and accessibility to your data centers. Learn about modern security threats to your centers, the consequences of substandard or nonexistent security measures, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Juniper Networks, Inc.

Password Management Evaluation Guide for Businesses
sponsored by Keeper Security Inc
WHITE PAPER: Learn the little-known reasons as to why passwords don't live up to their potential as security measures, how they cause data breaches, and how your organization can enhance its use of passwords to keep your data safe and secure.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Keeper Security Inc

The Top 5 Myths of Next-Gen Endpoint Protection
sponsored by TrendMicro
WHITE PAPER: Next-generation endpoint protection has been getting a lot of press recently. But what does the term actually mean? This short white paper dispels five common next-generation endpoint protection myths to help you sort through the marketing noise.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Limelight Cloud Security Services
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to protect your digital content, keeping abreast of the latest threats, without adding latency to the delivery experience. Access now to uncover how to defeat DDoS attacks, unauthorized access and theft of web content, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

Secure IoT As It Advances Through Maturity Phases
sponsored by Cloudera
WHITE PAPER: This analyst report analyzes the attributes of IoT risk by industry. The framework provided helps enterprise security and risk professionals predict when the products they build or the tools they use will likely become targets of attack.
Posted: 09 Nov 2016 | Published: 07 Jan 2016

Cloudera

Web Application Firewalls are Only Part of The Answer
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to solve the fundamental security issues that plague web applications, and shut down even "zero-day" attacks. Gain the benefits of origin lockdown from malicious traffic, new threat mitigation, detailed attack logging, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

Limelight DDoS Attack Interceptor
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to divert a DDoS attack and scrub the traffic before it ever reaches your enterprise. Learn how DDoS traffic can be identified, filtered, scrubbed off-site, and the passed back to your origin, all without compromising performance.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016

Check Point Software Technologies Ltd.

Why Your Business Needs Enterprise-Strength Password Management
sponsored by Keeper Security Inc
WHITE PAPER: Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Keeper Security Inc

The Path Ahead for Security Leaders
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to link your identity to business value rather than limiting it to security expertise. By doing so, the security leaders of today can earn a strategic role on the executive teams of tomorrow.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks
51 - 75 of 1671 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement