IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
76 - 100 of 1726 Matches Previous Page  |  Next Page
Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel®
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel®

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Do You Know Who I Am? Know Your Customer Systems Market Update
sponsored by BAE Systems
WHITE PAPER: Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.
Posted: 02 Mar 2017 | Published: 31 Aug 2016

BAE Systems

Achieve Compliance and Cost Control with Workspace Aggregation
sponsored by Matrix42
WHITE PAPER: Learn how to provide your organization with the solution to effectively deal with the security and compliance risks and improve cost control.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Matrix42

How Effective is Your AML Auditing?
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.
Posted: 02 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Cloud Computing Top Threats
sponsored by HPE and Intel®
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 02 Mar 2017 | Published: 29 Feb 2016

HPE and Intel®

Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

Continuous Endpoint Threat Detection and Response in a Point-in-Time World
sponsored by Cisco Systems, Inc.
WHITE PAPER: The only way to defeat today's security threats is to address them holistically across the full attack continuum – before, during, and after an attack. Discover an approach of continuous endpoint analysis in combination with a big data architecture to combat today's malware threat landscape.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Cisco Systems, Inc.

Ransomware: Everything You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

Cisco Systems, Inc.

Embrace Risk: Secure Your Hybrid Cloud
sponsored by HPE and Intel®
WHITE PAPER: Learn how to secure your hybrid cloud by treating security as something that should be built into the IT cloud strategy and its design from the very beginning.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

HPE and Intel®

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Should security pros rely on sandboxing as their single point of defense? Discover where sandboxing technology stands today, why it fails to meet the needs of organizations, and what's needed for effective malware analysis.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Your Guide to Spotting and Preventing Malware Infection
sponsored by Solarwinds MSP
WHITE PAPER: Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Solarwinds MSP

A Look at How Data Privacy Laws Impact Cloud Adoption in Russia
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy Russian data residency, privacy, and regulation requirements when it comes to the cloud. Discover how to avoid business disruptions by complying with the law.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Next-generation Firewall Platforms the Answer to NGFW Shortcomings?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall technology has evolved to be an essential cog in the overall cybersecurity machine, but it remains one of a multitude of puzzle pieces needed. In this ESG report uncover the NGFW shortcomings, and how to maximize their efficiency for your organization
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Secure Your Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure your email is protected against phishing attacks. Discover not only what to look for in threats coming in, but also how to tackle sophisticated email security challenges.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

The Ultimate Checklist To Preventing And Fighting Ransomware Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: When it comes to battling ransomware, your best offense is a good defense. Is your organization prepared to ward off an attack? Run through these 10 steps to develop, or enhance your existing, ransomware defense strategy.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

Fine-Tune Money Laundering Detection Tools with Analytics, Machine Learning
sponsored by BAE Systems
WHITE PAPER: Discover how to improve money laundering detection with analytics and machine-learning that can help you fine-tune anti-money laundering (AML) tools and test, simulate, and export AML models.
Posted: 28 Feb 2017 | Published: 03 Jan 2017

BAE Systems

How ransomware can hold your business hostage
sponsored by Dell SonicWALL
WHITE PAPER: Delve into the modern malware threat landscape and gain a detailed understanding of how malware targets your company, how it works, why traditional methods fail to protect against it, and how to mitigate your risk.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Dell SonicWALL

3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Secure Information Exchange in the Digital Age
sponsored by OpenText
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017

OpenText

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

4 Essential Capabilities for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.
76 - 100 of 1726 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement