IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2637 Matches Previous Page  |  Next Page
Maturing and Specializing: Incident Response Capabilities Needed
sponsored by Intel Security
WHITE PAPER: This white paper looks into global survey results on current incident response strategies and tools employed by your peers. Learn best practices for anticipating, planning, testing and validating response procedures for the worst attacks—because, inevitably, they are coming.
Posted: 06 May 2016 | Published: 31 Aug 2015

Intel Security

Orchestrating Security in the Cloud
sponsored by Intel Security
WHITE PAPER: The following report takes a look at survey results about cloud computing in today's organizations and reasons behind the growing trend.
Posted: 06 May 2016 | Published: 30 Sep 2015

Intel Security

Leveraging Threat Intelligence In Incident Response
sponsored by Intel Security
WHITE PAPER: This white paper is designed to help you build the right security workforce, give them the best processes, and provide the tools necessary to protect your enterprise data.
Posted: 06 May 2016 | Published: 21 Aug 2014

Intel Security

A Cloud Security Primer
sponsored by Intel Security
WHITE PAPER: The shift to cloud computing is one of the most significant IT initiatives of our time and there is no standard adoption method With the different cloud models and methods, this leaves room for confusion to set in. Whether or not you've already adopted cloud technology, aceess this white paper now to prepare for the inevitable attacks.
Posted: 06 May 2016 | Published: 29 Apr 2016

Intel Security

Emergency Incident Response: 10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: This white paper highlights the top 10 common emergency incident response mistakes that organizations commonly make. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are effective and secure.
Posted: 06 May 2016 | Published: 31 Dec 2012

Intel Security

The 5 Characteristics of an Intelligence-Driven Security Operations Center
sponsored by Intel Security
WHITE PAPER: Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.
Posted: 06 May 2016 | Published: 15 Nov 2015

Intel Security

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: In this video, learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management by virtualizing the security infrastructure. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security

The What, the Why, and the How of Hybrid Cloud
sponsored by Intel Security
WHITE PAPER: Many of us have come to think of "The Cloud" as referring to public or private cloud. However, hybrid cloud means not having to choose, and if you do, then you can switch back and forth as needed. Access this comprehensive white paper to learn about what hybrid clouds are, why they're beneficial and how to take full advantage of them.
Posted: 06 May 2016 | Published: 27 Apr 2016

Intel Security

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover in this expert white paper why piecemeal endpoint defenses are not are sufficient to protect against today's threat vectors—and think like an attacker to bolster your defenses. Read on to take 6 steps toward better security, including learning to redefine your perimeter, and more.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Securosis: SIEM Kung Fu
sponsored by Intel Security
WHITE PAPER: In this extensive research report, learn how to make the most of your existing security information and event management product or service. Discover key tips to this end, including: focus on the adversary, master response, and 2 more. Also, find a detailed rundown of advanced SIEM use cases.
Posted: 06 May 2016 | Published: 21 Apr 2016

Intel Security

ESG Lab Validation Report: McAfee Next Generation SIEM
sponsored by Intel Security
WHITE PAPER: Access this ESG lab validation report to discover how a holistic approach that can leverage multiple interconnected security solutions as a unified ecosystem might be the answer to modern IT security dilemmas.
Posted: 06 May 2016 | Published: 30 Apr 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Learn from this exclusive white paper why you must add cyber-criminal motivation to your threat taxonomy, in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23 percent on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation allows your security team to focus on the problem areas and minimize resource usage. Access this eBook to learn more about this technology and better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Advanced security from the inside with VMware NSX
sponsored by VMware
WHITE PAPER: This white paper shows you a new way to implement data center security that constantly monitors threats while you're away. Now fine-grained threat isolation, segmentation and centralized control are all possible inside your data center. Access now to learn how you can gain fully streamlined operations and centralized control today.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Customer Story: Kuwait Petroleum Corporation
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

Brasfield and Gorrie builds productivity and security with paperless collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T
1 - 25 of 2637 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement