IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
51 - 75 of 1617 Matches Previous Page  | Next Page
Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: Download this exclusive white paper now to learn about three security ratings that can help you identify, quantify, and mitigate risk throughout your environment.
Posted: 25 Nov 2014 | Published: 15 Apr 2014

BitSight

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

Top Tips for Time Stretched Admins
sponsored by ControlNow
WHITE PAPER: This guide provides time-saving tips that IT admins at smalland mid-sized companies can use to stay on top of theirworkloads, keep systems running and protected, and maintaina healthy work/life balance.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Top Cyber Intrusion Mitigation Strategies
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at today's best threat mitigation strategies, and how the addition of next-generation threat intelligence can provide rock-solid security. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Palo Alto Networks

The Internet of Things: A CISO and Network Security Perspective
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.
Posted: 24 Nov 2014 | Published: 14 Oct 2014

Cisco

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Five Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

4 Steps to Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this brief whitepaper to find out the four steps to security intelligence.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Hewlett-Packard Company

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Full Analysis of the Cyber-Risk Management Landscape in 2014
sponsored by BitSight
WHITE PAPER: Continue on to this important whitepaper now to explore the state of cyber-risk management in 2014.
Posted: 20 Nov 2014 | Published: 18 Jun 2014

BitSight

The Economic Impact of AdvancedPersistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the financial impact of advanced persistent threats by detailing the results of a study of 755 IT and IT security practitioners.
Posted: 20 Nov 2014 | Published: 13 May 2014

IBM

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. The solution: grow your own.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Enhance Network Security: A Survey by Ipsos Observer for HP
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
51 - 75 of 1617 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement