IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
1 - 25 of 2942 Matches Previous Page  |  Next Page
Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell and Microsoft
RESEARCH CONTENT: In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.
Posted: 19 Jul 2017 | Published: 05 Apr 2017

Dell and Microsoft

Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: AWS is popular for the wealth of benefits it offers users, but a vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure. Access this white paper to learn about protecting your AWS environment with unified threat management.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

AWS - Sophos

Understanding the Security Leaders' Plight
sponsored by Dell SecureWorks
WHITE PAPER: When business leaders and security pros aren't communicating with each other, breaches can happen. Learn the 13 areas of IT security where cooperation between both teams is essential.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Dell SecureWorks

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 17 Jul 2017 | Published: 28 Apr 2017

Microsoft

CW ASEAN – July 2017: Be alert to threats
sponsored by ComputerWeekly.com
EZINE: With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

CW ANZ – July 2017: Cyber security plan bears fruit
sponsored by ComputerWeekly.com
EZINE: Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

Top 5 IoT Deployment Best Practices
sponsored by Hewlett Packard Enterprise
RESOURCE CENTER: Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

Hewlett Packard Enterprise

How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

Beyond your company boundaries
sponsored by ComputerWeekly.com
PRESENTATION: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

modusCloud Email Security URL Defense
sponsored by Vircom
RESOURCE: Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Vircom

Security Monitoring Solved: An Expert Path to Clairvoyant Defense
sponsored by IBM
VIRTUAL ENVIRONMENT: Security monitoring is essential for staying ahead of the threat landscape. In this exclusive webinar featuring Forrester Research, uncover the criteria for evaluating vendors, the benefits of integrated security platforms and much more.
Posted: 06 Jul 2017 | Premiered: 05 Jul 2017

IBM

The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by IBM
VIRTUAL ENVIRONMENT: How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for.
Posted: 06 Jul 2017 | Premiered: 27 Jun 2017

IBM

Don't Let Smart Devices Outsmart IT
sponsored by Aruba Networks
RESOURCE: Mobility and the Internet of Things are changing both the IT landscape and our approaches to security. This infographic gives you the basics of delivering a security framework built on adaptive trust defense. You will learn about the growing risks and real-world solutions for the new era.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Aruba Networks

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
WHITE PAPER: According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

Your In-Depth 2017 Cybersecurity Report
sponsored by Comstor
RESEARCH CONTENT: Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Comstor

The Impact of Data Breaches on Reputation and Share Value
sponsored by Centrify Corporation
RESEARCH CONTENT: Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.
Posted: 28 Jun 2017 | Published: 31 May 2017

Centrify Corporation

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation
1 - 25 of 2942 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement