IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2902 Matches Previous Page  |  Next Page
2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Data-centric security Battling Malware, Intrusion and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval. Learn how you can effectively restore unstructured data to a new or newly-imaged device, protect against exfiltration, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Security Information and Event Management (SIEM) Orchestration
sponsored by Intel Security
WHITE PAPER: This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

How Collaboration Can Optimize Security Operations
sponsored by Intel Security
WHITE PAPER: Collaboration is vital to improving security operations. Access this white paper and learn more about how a collaboration investment can help teams contribute to real-time visibility across events, data, and systems.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your security team more efficient when reacting to an assortment of threats and vulnerabilities.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey
sponsored by Intel Security
RESEARCH CONTENT: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this comprehensive report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA, Intel Security, as they go over findings from this year's Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Learn how the disconnect between security and IT tools can led to seemingly lackadaisical security responses to serious breaches. Uncover how lack of automation, organizational opacity, unsecured data sets, and numerous and disjointed tools all add to this supreme inefficiency.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

Guidance on Healthcare Ransomware Attacks
sponsored by OpenDNS
EGUIDE: Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.
Posted: 23 Sep 2016 | Published: 16 Sep 2016

OpenDNS

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Defining Security for Today’s Cloud Environments
sponsored by Fortinet, Inc.
EBOOK: Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Importance of Incident Response Collaboration
sponsored by Dimension Data
EGUIDE: This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
Posted: 22 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Say Hello, Again, to SIEM
sponsored by SearchSecurity.com
EBOOK: SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SearchSecurity.com

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
1 - 25 of 2902 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement