IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
76 - 100 of 1340 Matches Previous Page  | Next Page
Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER: This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Protecting Control Networks: Key Considerations For Protection
sponsored by Sourcefire
WHITE PAPER: This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Cisco Live Milan: IOE, SDN, and a lot of Wine
sponsored by Cisco Systems, Inc.
WHITE PAPER: This valuable resource details the revelations brought on regarding the Internet of Everything, Big Data and more at a recent Cisco sponsored conference in Italy.
Posted: 04 Apr 2014 | Published: 10 Feb 2014

Cisco Systems, Inc.

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Avoiding Cloud Security Audit Pitfalls
sponsored by INetU Inc.
WHITE PAPER: This resource defines the top 5 most common cloud audit pitfalls, and offers suggestions on how to avoid each.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

INetU Inc.

Testing Report Enterprise Firewalls
sponsored by Cisco
WHITE PAPER: This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.
Posted: 03 Apr 2014 | Published: 31 Jul 2012

Cisco

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

IBM

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

Two Great Ways to Protect Your Virtual Machines From Malware
sponsored by Sophos, Inc.
WHITE PAPER: This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Sophos, Inc.

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Trusted Storage Vendor Duo Provides Video Surveillance Solutions You Can Count On
sponsored by EMC & Arrow
WHITE PAPER: Check out this exclusive white paper to uncover the key features of the latest comprehensive, certified video surveillance solutions from trusted vendors.
Posted: 02 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This exclusive resource discusses how your organization can form an effective mobile strategy designed to help you get the most value from your mobile initiatives.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Aruba Networks

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems
76 - 100 of 1340 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement