IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
1 - 25 of 2378 Matches Previous Page  | Next Page
Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.

Mobility Management Selection Guide
sponsored by Citrix
WHITE PAPER: This crucial white paper takes an in-depth look at the criteria you can use to choose the best enterprise mobility management system for your organization’s specific needs.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Citrix

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

A Risk Management Approach to HITECH
sponsored by Symantec Corporation
WHITE PAPER: This exclusive resource describes the challenges of security and privacy in the healthcare environment, discussing how you can best assess risk, prevent data loss, and secure critical systems with minimal impact on the end user or the quality of patient care.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Symantec Corporation

Securing 24x7 Operation of Clinical IT Systems
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper highlights 6 risk management and compliance best practices to help HCOs avoid strict HIPAA violations and fines.
Posted: 23 Apr 2014 | Published: 31 Dec 2013

Symantec Corporation

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Cisco Email Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco Systems, Inc.

Content Security – Safe Guarding Organization Play
sponsored by Cisco Systems, Inc.
WEBCAST: This informative webcast discusses a security solution that is designed specifically to inspect the content of web and email transactions using state-of-the art threat intelligence, eliminating potentially harmful threats while allowing safe transactions to proceed effectively and efficiently.
Posted: 23 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
EGUIDE: Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

Email Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

IT Can Be Done: How to Protect Enterprise Data Yet Enable Secure Access for End Users
sponsored by Code42
WEBCAST: Listen in to this webcast to learn how to protect enterprise data yet enable secure access for end users.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Code42

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource highlights a pervasive, network-based security solution that improves data protection across critical Web business tools against a more advanced threat landscape.
Posted: 22 Apr 2014 | Published: 31 May 2013

Cisco Systems, Inc.

Cisco adds Sourcefire AMP to email, Web security
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This informative resource discusses a recent merger that brought together advanced malware protection for your email and web gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Ensuring Security for your E-Mail Applications
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches.
Posted: 22 Apr 2014 | Published: 27 Feb 2014

Cisco Systems, Inc.

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Filling the Threat Management Gateway Void
sponsored by F5 Networks
WHITE PAPER: This guide explores a top threat management solution and how it can provide superior scalability and performance.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

F5 Networks

Protect your Devices with File Sync and Share Platform
sponsored by Code42
WHITE PAPER: This white paper highlights a continuous, secure, enterprise-ready file sync and share platform that facilitates real-time collaboration across all devices.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Code42
1 - 25 of 2378 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement