IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
76 - 100 of 1710 Matches Previous Page  |  Next Page
The Core Benefits of Cloud-Based SIEM
sponsored by Splunk
WHITE PAPER: Should you move your SIEM to the cloud? Find out if on-prem or cloud is right for you by uncovering the top 5 benefits of cloud-based SIEM.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Five areas for Cybersecurity Innovation in 2017
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn about 5 areas that are poised to be major points for cybersecurity innovation this year like deep learning for attack analysis, big data for log correlation, strengthening container security, and more.
Posted: 02 May 2017 | Published: 02 May 2017

Fortinet, Inc.

Enable Multilayered Printer Protection with Dell
sponsored by TechData - Dell
WHITE PAPER: Access this resource to learn about the variety of security features offered by Dell printers to guard against both internal and external threats like unauthorized access to documents, hacking, and suspicious user activity.
Posted: 02 May 2017 | Published: 02 May 2017

TechData - Dell

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

4 Business Email Compromise Techniques and How to Stop Them
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how to protect your enterprise from business email compromise-style attacks. Uncover 4 common business email compromise techniques and how to mitigate the risk.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 01 May 2017 | Published: 01 May 2017

Splunk

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn seven key features to look for when evaluating a DLP system, and how each one overlaps with the others to provide your enterprise with optimal protection.
Posted: 01 May 2017 | Published: 01 May 2017

Symantec & Blue Coat Systems

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: In this ESG lab report discover how to deploy fast and easy identification and prioritization of email-based cybersecurity threats, giving your organization at-a-glance summary information about each threat.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

Maximizing Mobile Security and Productivity
sponsored by BlackBerry
WHITE PAPER: Learn how to make your organization more mobile-secure in 5 steps.
Posted: 01 May 2017 | Published: 01 May 2017

BlackBerry

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

Increase Mobile Productivity and Scale without Sacrificing Security
sponsored by BlackBerry
WHITE PAPER: Discover how to consolidate mobile device management, apps, corporate data and other endpoints across different operating systems and ownership models to a single pane of glass for a stronger security posture.
Posted: 01 May 2017 | Published: 01 May 2017

BlackBerry

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Office 365: This the ROI You Were Expecting?
sponsored by Microsoft
WHITE PAPER: In this Forrester study learn the total economic impact of Microsoft Office 365 for small and midsize businesses, and give you a sense of what kind of ROI to expect when deploying Office 365.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Create Your Cloud Security Technology Strategy And Road Map
sponsored by Microsoft
WHITE PAPER: Forrester Research warns that "your current 'we control everything' security strategy does not apply to the cloud". With such a fundamental shift, how can CISOs approach the issue? Access this Forrester report to discover how to secure your enterprise on the cloud.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: Given the importance of mobile computing in keeping businesses competitive, it's more important than ever that organizations strike the appropriate balance between security and productivity. Access this whitepaper to uncover how to act upon security best practices, score your business' security infrastructure and more.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk
76 - 100 of 1710 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement