IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2928 Matches Previous Page  |  Next Page
10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe once you adopt cloud services. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions answered in this white paper, covering your organizations first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Symantec & Blue Coat Systems

Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Information and data is fueling the digital transformation. Join senior analyst from Forrester Research, Heidi Shey as she breaks down the digital transformation, uncovers 3 key requirements for success and the benefits of secure information exchange.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity
sponsored by IBM
CASE STUDY: The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats Like Ransomware
sponsored by Iron Mountain
EGUIDE: As the threat landscape changes, you need to be able to change with it. In this expert-eguide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Iron Mountain

What's The Best Risk Analysis Method for Enterprises?
sponsored by Presidio Networked Solutions
EGUIDE: In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.
Posted: 20 Feb 2017 | Published: 16 Feb 2017

Presidio Networked Solutions

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

AVST
1 - 25 of 2928 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement