IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
51 - 75 of 1638 Matches Previous Page  |  Next Page
How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

BitSight

Understanding and Mitigating DNS DDoS Attacks
sponsored by Box
WHITE PAPER: A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. So what are your company's risks and how can you mitigate them?
Posted: 06 Feb 2017 | Published: 31 Dec 2015

Box

Financial Technologies Protects its Network From Malware and Other Internet Threats
sponsored by ContentKeeper
WHITE PAPER: Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution
sponsored by ContentKeeper
WHITE PAPER: Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Vendor Analysis: 8 Cloud Security Gateway Providers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this Forrester report, discover a 23-criteria evaluation for cloud security gateway (CSG) providers that identifies, analyzes, and scores the top 8, allowing you to make an educated decision in choosing which one might be the best for your enterprise.
Posted: 03 Feb 2017 | Published: 15 Nov 2016

Symantec & Blue Coat Systems

How to Strengthen Your Identity Infrastructure
sponsored by ExtraHop
WHITE PAPER: Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ExtraHop

7 Data Loss Prevention Suite Providers Compared
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.
Posted: 02 Feb 2017 | Published: 08 Nov 2016

Symantec & Blue Coat Systems

How to Get More Signal, Less Noise for Your SIEM
sponsored by ExtraHop
WHITE PAPER: Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ExtraHop

Confronting Enterprise Security Risk: The State of Incident Response
sponsored by ServiceNow
WHITE PAPER: In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

An Essential Checklist for Your Security Response Solution
sponsored by ServiceNow
WHITE PAPER: Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

A New Paradigm for Identity Assurance
sponsored by RSA
WHITE PAPER: Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.
Posted: 30 Jan 2017 | Published: 31 Dec 2016

RSA

Status Quo Creates Security Risk
sponsored by ServiceNow
WHITE PAPER: Discover what 184 IT pros think are the most important factors that lead to incident response excellence, such as security and IT tool integration, the ability to know whether a security incident impacts a critical system and strong collaboration between the incident response and IT operations teams.
Posted: 27 Jan 2017 | Published: 29 Feb 2016

ServiceNow

Bringing IT and Security Together for Better Security Response
sponsored by ServiceNow
WHITE PAPER: Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ServiceNow

How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Mobile Security: The Case for Enterprise Mobility Management
sponsored by Freudenberg IT
WHITE PAPER: Without a dynamic Enterprise Mobility Management (EMM) strategy in place, your company data risks being lost, stolen or otherwise compromised. Learn about the importance of establishing an EMM strategy and explore the multi-level approach your company may need to employ to ensure all your security and compliance demands are met.
Posted: 27 Jan 2017 | Published: 17 Jan 2017

Freudenberg IT

HPE Enterprise Secure Key Manager Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett Packard Enterprise

6 Tips to Maximize Productivity with Identity-as-a-Service (IDaaS)
sponsored by Microsoft
WHITE PAPER: Identity-as-a-Service (IDaaS) is an emerging strategy for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Learn the top six considerations to keep in mind when selecting your IDaaS.
Posted: 26 Jan 2017 | Published: 22 Jun 2015

Microsoft

Encryption Key Management Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how enterprise encryption key management is fundamentally changing alongside data centers and applications, as well as how to prepare your organization for this revolution in design, function, and efficiency.
Posted: 26 Jan 2017 | Published: 27 Sep 2016

Hewlett Packard Enterprise

A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Discover why it takes so long for organizations to discover when they have been breached. Learn how to mitigate, remediate, and recover faster.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

ServiceNow

How GDPR Compliance Can Drive Business Growth and Increase Value
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how to mitigate risk and derive business value as you take on the EU GDPR. Gain access to a comprehensive guide to GDPR, multiple GDPR-related videos, and a breakdown of how to achieve GDPR compliance.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett-Packard Enterprise

Data Protection and Encryption Driven by GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Discover how to manage customized encryption keys, particularly at high volumes, while minimizing overhead costs. Learn how "one size fits all" encryption might not be the best for your company, and what role your encryption can play in GDPR compliance.
Posted: 25 Jan 2017 | Published: 31 Aug 2016

Hewlett-Packard Enterprise

The Ultimate Guide to Preventing Web Scraping
sponsored by Distil Networks
WHITE PAPER: It is estimated that 46% of all web activity is now down to bots. There are good and bad bots but web scrapers are in a gray area. Discover the issues around web scrapers and what can be done to control their activity.
Posted: 24 Jan 2017 | Published: 30 Dec 2016

Distil Networks

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault
51 - 75 of 1638 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement