IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2633 Matches Previous Page  |  Next Page
Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

A Strategic Partner for Proactive Security
sponsored by CrowdStrike
WHITE PAPER: This brochure explains how choosing the right security partner can help you thrive in today's dangerous cybercrime environment.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Case Study: Health Insurer Innovates its Endpoint Security
sponsored by CrowdStrike
VIDEO: This brief video describes how a major healthcare provider updated its security with a next generation endpoint protection platform.
Posted: 03 Aug 2015 | Premiered: 31 May 2015

CrowdStrike

Detect Threats in Real Time with SaaS Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This brochure describes how a cloud-based platform can enhance your endpoint security capabilities.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Establishing a Mobile Security Architecture
sponsored by Oracle Corporation
WHITE PAPER: This resource can help you build a new security architecture that embraces mobility.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Oracle Corporation

Taking Advantage of the General Data Protection Regulation
sponsored by Oracle Corporation
WHITE PAPER: This resource provides a breakdown all of the information you need to navigate the data security changes brought by the upcoming General Data Protection Regulation.
Posted: 03 Aug 2015 | Published: 31 May 2015

Oracle Corporation

Managing the Madness of Mobility
sponsored by Sprint
EBOOK: For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Sprint

Are You Doing All You Can to Protect Your Critical Business Information?
sponsored by Citrix
RESOURCE: This resource discusses how you can move on from your outdated strategies and adopt security designed for today's threats.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

How Microsoft Enables The Anywhere Workplace
sponsored by Data#3
VIDEO: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

Data#3

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

Make Your Security Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Test Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Strengths and Weaknesses of 13 SIEM Solutions
sponsored by AlienVault
WHITE PAPER: This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.
Posted: 30 Jul 2015 | Published: 20 Jul 2015

AlienVault

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Three Ways to Leverage Desktop Virtualization To Reduce the Complexity in Securing Endpoints
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore three ways that desktop virtualization can reduce the time and complexity involved in securing endpoints – while also limiting your risk of data loss from security breaches.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Dell, Inc. and Intel®

Top 10 reasons to strengthen information security with desktop virtualisation
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how desktop virtualization overcomes information security challenges in today's enterprises. You'll discover how desktop virtualization compares to traditional security models and the top 10 benefits of using desktop virtualization to strengthen information security.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the network and backend components of your web solutions.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix
1 - 25 of 2633 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement