IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2996 Matches Previous Page  |  Next Page
Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

SailPoint-Identity-is-Everything
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR results in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

SailPoint-Get-Ready-for-GDPR
sponsored by SailPoint Technologies
WHITE PAPER: Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches, 4 key areas where you need security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


Cyber Threats: A perfect storm about to hit Europe?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

ComputerWeekly.com

Do You Know Who Owns Your Data?
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

SailPoint Technologies

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

Employee Monitoring: An Important Security Measure?
sponsored by Veriato, Inc.
EGUIDE: Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this.
Posted: 19 Apr 2017 | Published: 12 Apr 2017

Veriato, Inc.

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

Keeping Up with the Evolution of Security Operations Centers
sponsored by McAfee, Inc.
WEBCAST: Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.
Posted: 19 Apr 2017 | Premiered: Apr 19, 2017, 01:13 EDT (05:13 GMT)

McAfee, Inc.

77% of Hacked Passwords Comply with Current Standards
sponsored by Specops Software
RESOURCE: Discover a method of granulated password policy application that provides protection and support not available under the default Window's password policy. Also uncover a link to a password strength auditor and more.
Posted: 19 Apr 2017 | Published: 10 Feb 2017

Specops Software

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Hackers Share Secrets so You Can Make Their Job Harder
sponsored by Thycotic
WHITE PAPER: Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.
Posted: 19 Apr 2017 | Published: 31 Dec 2016

Thycotic

What New NIST Password Recommendations Should Enterprises Adopt?
sponsored by Specops Software
EGUIDE: Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines.
Posted: 18 Apr 2017 | Published: 11 Apr 2017

Specops Software

A Safe Password System? Here's How
sponsored by Specops Software
EGUIDE: Learn the ropes of what makes for more effective password risk management, how to avoid common pitfalls organizations make in implementing password policies, and 3 major risks of password compromise.
Posted: 18 Apr 2017 | Published: 11 Apr 2017

Specops Software

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this product and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

Passwords Defined: Build Stronger Passwords
sponsored by Specops Software
WHITE PAPER: Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.
Posted: 18 Apr 2017 | Published: 05 Dec 2016

Specops Software

Password Security Checklist: Ensure PCI Compliance
sponsored by Specops Software
WHITE PAPER: Uncover vital questions to provide your organization with a good starting point on the path to improving your password security.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

Specops Software

3 Common Password Policy Mistakes
sponsored by Specops Software
RESOURCE: Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.
Posted: 17 Apr 2017 | Published: 29 Jul 2016

Specops Software

Employee Social Network Password Practices a Major Workplace Risk
sponsored by Thycotic
WHITE PAPER: A survey conducted at the February 2017 RSA Conference in San Francisco reveals startling and disturbing insights into the password habits of security professionals (and likely their fellow employees). Discover key survey findings that can help protect your organization.
Posted: 17 Apr 2017 | Published: 30 Dec 2016

Thycotic
1 - 25 of 2996 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement