IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementWhite Papers (View All Report Types)
76 - 100 of 1641 Matches Previous Page  | Next Page
Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

New Topics on the 2014 Security+ SY0-401 Exam
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper details the changes to the CompTIA Security + exam and helps you prepare for the test.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel® Services
WHITE PAPER: This white paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope"―which include any network components that are the primary focus of PCI DSS regulation, compliance, and assessment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

PCI DSS Tokenization Buyer’s Guide
sponsored by Intel® Services
WHITE PAPER: The guide describes how tokenization works, and how retailers and other businesses can deploy it to reduce risks of data compromise and the cost of PCI compliance.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Intel® Mashery™ API Gateway - Tokenization
sponsored by Intel® Services
WHITE PAPER: Intel® Mashery™ API Gateway - Tokenization is a hardware or software appliance that dramatically simplifies PCI DSS & PII compliance and administration for organizations across all industry types that accept, capture, store, transmit or process credit card, debit card, or sensitive personal data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

TaaSera

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

Using PCI DSS Criteria for PII Protection
sponsored by Intel® Services
WHITE PAPER: This white paper describes how organizations can benefit from using PCI guidelines and solutions for PII data compliance, and also introduces a compliance and data protection gateway that helps organizations to achieve data protection for both PII and PCI data through data tokenization and format-preserving encryption.
Posted: 04 Nov 2014 | Published: 31 Jul 2014

Intel® Services

Your Critical Missing Security Vantage Point
sponsored by ObserveIT
WHITE PAPER: This white paper explains why user activity monitoring is critical in order to address the problem associated with users.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation

An Approach to Security Frameworks
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will show you how to meet compliance frameworks while also improving security levels.
Posted: 29 Oct 2014 | Published: 23 Sep 2014

Symantec Corporation

Protect Your Company's Lifeblood
sponsored by Onapsis
WHITE PAPER: The following white paper examines the potential hazards of overlooking ERP application layer security and offers insight into a platform solution intended to help improve visibility and descrease security vulnerabilities.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


Onapsis Security Platform Datasheet
sponsored by Onapsis
WHITE PAPER: Organizations today have little to no visibility into the actions being performed on or against their SAP systems either historically or in real time. The following white paper explores this issue and offers insight into a detection and response solution that can help detect abnormalities within SAP and finally provide peace of mind from attacks.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


Is the Heart of Your SAP System at Risk?
sponsored by Onapsis
WHITE PAPER: The following white paper explores the often-overlooked cyber-layer of the SAP system and provides practical advice on how to prevent security risks and attacks from taking place within this realm.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


Protect Your Organization from DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation

BYOD and Mobile Security: The Disconnect Between Employers and Employees
sponsored by Webroot
WHITE PAPER: This white paper proposes that there is a disconnect between how employees use mobile security and how organizations implement BYOD policies, and presents the results of a recent study commissioned by Webroot that examines these issues.
Posted: 27 Oct 2014 | Published: 31 Jul 2014

Webroot

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation
76 - 100 of 1641 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement