IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2710 Matches Previous Page  |  Next Page
Endpoint Protection for Today's Threats
sponsored by Webroot
WHITE PAPER: This white paper introduces a new endpoint security technology that takes up less space on your devices while blocking more advanced threats.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Webroot

Protect Your Network with One Integrated System
sponsored by IBM
WHITE PAPER: This white paper explores the tactics of today's advanced attacks and explains how to foil them with the strategic use of a single security technology.
Posted: 03 Sep 2015 | Published: 30 Jun 2015

IBM

The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This Ponemon report uses data from all over the UK to calculate how different organizational factors impact the cost of a data breach.
Posted: 03 Sep 2015 | Published: 31 May 2015

IBM

Cybersecurity and Data Protection: What Every Board of Directors Should Know
sponsored by Raytheon|Websense
WHITE PAPER: This document presents a non-technical overview of cybersecurity and provides recommendations for board members wishing to keep their organization safe.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Raytheon|Websense

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Cyber-Threats in 2015
sponsored by Webroot
WHITE PAPER: This white paper arms you with the most up-to-date web security knowledge that you need to keep your clients safe.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Webroot

Actionable Threat Intelligence for Healthcare Organizations
sponsored by BrightPoint Security
WHITE PAPER: This white paper examines the challenge of healthcare security and discusses how you can obtain threat intelligence that solves many of these challenges.
Posted: 02 Sep 2015 | Published: 02 Jun 2015

BrightPoint Security

The impact of virtualization security on your VDI environment
sponsored by BitDefender
WHITE PAPER: This paper outlines how the impact of endpoint security on virtualized environments is directly related to the achievable consolidation ratios (the number of virtual machines that can be run on each physical host).
Posted: 02 Sep 2015 | Published: 29 May 2015

BitDefender

Critical Capabilities for Security Information and Event Management
sponsored by IBM
WHITE PAPER: This Gartner report reviews fifteen different SIEM offerings, ranking them according to use cases and revealing which products work best in different environments.
Posted: 02 Sep 2015 | Published: 25 Jun 2015

IBM

Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ThinkingPhones

Using Big Data and Behavioral Analytics to Enhance Cybersecurity
sponsored by Splunk
WEBCAST: Demetrios Lazarikos, IT security strategist and thought leader, addresses the growing importance of data security in enterprise, financial and healthcare industries. Demetrios also highlights how behavioral analytics, in combination with big data tools, can be used by IT security personnel to establish alerts and enhance security.
Posted: 01 Sep 2015 | Premiered: Jan 18, 2014

Splunk

Actionable Threat Intelligence for Financial Services Organizations
sponsored by BrightPoint Security
WHITE PAPER: This white paper explains how automated and correlated threat intelligence capabilities can help even the largest financial institutions stay secure.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

BrightPoint Security

Performance Reviews of 7 Next-Gen IPS Tools
sponsored by IBM
WHITE PAPER: This Gartner report looks at leading the next-generation IPS tools, giving detailed reviews on seven of the best.
Posted: 01 Sep 2015 | Published: 29 Dec 2014

IBM

Weak links – Strengthening the information supply chain
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

ComputerWeekly.com

Case Study: Rethinking Endpoint Security
sponsored by Malwarebytes Corporation
WHITE PAPER: This case study tells of how Sun Products, a leading provider of household products, rethought its endpoint security strategy to better fight malware.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


An Inside View of a Zero-Day Attack
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper gives an inside look at the lifecyle of zero-day exploit, tracking its progress from initial attack to ultimate remediation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


The Price You Pay for a Data Breach
sponsored by IBM
WHITE PAPER: This research report reveals just how much American businesses stand to lose to a cyber-attack, breaking down costs by industry, enterprise size, and more.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014

Webroot

Special Report: Which SIEM Platform is Best for You?
sponsored by IBM
WHITE PAPER: This Gartner report examines thirteen of the leading SIEM vendors, giving a detailed analysis of each one's strengths and weaknesses.
Posted: 31 Aug 2015 | Published: 20 Jul 2015

IBM

Security Essentials for CIO's: Secure the Extended Workplace
sponsored by IBM
WHITE PAPER: This white paper discusses the problems 3rd party contractors pose to security and gives tips for ensuring your business partnerships are as safe as possible.
Posted: 28 Aug 2015 | Published: 30 Sep 2012

IBM

IT Case Study: Overtake Medical Center Enhances Healthcare Applications
sponsored by F5 Networks
WHITE PAPER: This white paper serves as a case study of Overlake Medical Center, and outlines how to provide secure remote access to all enterprise applications and network resources for healthcare facilities, as well as how to manage these apps with a small IT team.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

F5 Networks

Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

Capturing Opportunity in a World of Dynamic Security Threats
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Webroot

Time to Rebuild Your IT Infrastructure Security Policy
sponsored by VMware
EGUIDE: Access this exclusive e-guide to learn from the experts why IT security has taken a backseat to other IT initiatives and why you shouldn't wait to address security policy issues.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

VMware

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security
1 - 25 of 2710 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement