IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 3058 Matches Previous Page  |  Next Page
How to Secure your Network Smarter and Faster
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Hyland Ensures Growth with High-Performance, Intelligent Network Security
sponsored by Juniper Networks, Inc.
CASE STUDY: In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Juniper Networks, Inc.
CASE STUDY: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

Delivering Fortinet Security to AWS GovCloud Customers
sponsored by AWS - Fortinet
RESOURCE: In this resource, gain a quick look at the 6 virtual security products optimized for AWS to help your organization with a secure and future-proof transition to a cloud environment.
Posted: 17 Nov 2017 | Published: 10 Aug 2017

AWS - Fortinet

Automated, Unified Security for your Entire IT Environment
sponsored by AWS - Fortinet
EBOOK: In this e-book, gain a stronger understanding of how Fortinet Security Fabric can increase your organization's security and network performance across your cloud deployment with Amazon Web Services (AWS).
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

Amazon Web Services: Automatically Scale Cloud Security
sponsored by AWS - Fortinet
WHITE PAPER: This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud
sponsored by AWS - Fortinet
WHITE PAPER: Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.
Posted: 17 Nov 2017 | Published: 30 Apr 2017

AWS - Fortinet

Design and deliver cloud-based apps and data for flexible, on-demand IT
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

Understanding Identity Governance
sponsored by SailPoint Technologies
EBOOK: Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

SailPoint Technologies

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

Discover an Advanced Cloud-Based Threat Prevention Suite
sponsored by Juniper Networks, Inc.
WHITE PAPER: Inside this tech overview, learn about Sky Advanced Threat Prevention, a cloud-based service with features built to adapt to the ever-changing threat landscape and fend off today's ransomware and DDoS attacks.
Posted: 16 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Preparing for the New OWASP Top 10 and Beyond
sponsored by F5 Networks
WHITE PAPER: Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.
Posted: 16 Nov 2017 | Published: 31 Oct 2017

F5 Networks

Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime
sponsored by Juniper Networks, Inc.
RESEARCH CONTENT: In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Juniper Networks, Inc.

Top 4 Ways to Strengthen Security with PC Lifecycle Management
sponsored by Dell EMC
RESOURCE CENTER: Endpoints remain the number one source for security breaches, which is why it's more important than ever to reduce risk by staying up to date with the latest security advancements. Download this resource to discover how PC lifecycle management can reduce security risks for your organisation in 4 key ways.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Dell EMC

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

The Complete Guide to Building a Security Culture
sponsored by Trustwave
WHITE PAPER: IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Trustwave

CW ASEAN – November 2017: How managed security services help to reduce cyber risk
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

CW ANZ – November 2017: On cyber alert
sponsored by ComputerWeekly.com
EZINE: In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

Q&A: How to Think Smarter About Database Security
sponsored by Trustwave
RESOURCE: Inside this Q&A with Raul Gutierrez, principal global security architect at Trustwave uncover steps to take to maintain compliance with the new data protection and privacy laws, and help eliminate vulnerabilities in your environment.
Posted: 10 Nov 2017 | Published: 04 Oct 2017

Trustwave

4 Steps to Kick-Start Your Security Program
sponsored by LogMeIn Rescue
RESOURCE: Your customers trust you to protect their data, so it is crucial to retain that trust by making security a top priority. Learn how you can protect customers and provide a better overall experience.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

LogMeIn Rescue

How to Build a Rock-Solid Software Security Initiative in 5 Steps
sponsored by Synopsys
EBOOK: Find out how security pros and app development teams can work together better to ensure app security, and discover your roadmap to building a sound software security initiative.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Synopsys
1 - 25 of 3058 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement