IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
101 - 125 of 2748 Matches Previous Page  |  Next Page
2016 Next-gen Infrastructure Security Report
sponsored by Illumio
ANALYST REPORT: The modern cybersecurity landscape is changing, how far are you willing to go to stay safe? This 2016 Next-gen Infrastructure Security Report will provide an overview of technology focusing on cloud and the challenges emerging with the software-defined anything (SDx) infrastructure.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Illumio

The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
sponsored by Illumio
WHITE PAPER: In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.
Posted: 14 Jun 2016 | Published: 31 Oct 2015

Illumio

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

The Challenge Of Securing And Managing Today's Complex Network Environments
sponsored by Fortinet, Inc.
RESOURCE: This Forrester research report identifies the modern threats to enterprise IT and provides key recommendations for implementing firewalls and centralized management solutions, plus building protections into your network operations to thwart increasingly frequent and sophisticated attacks.
Posted: 13 Jun 2016 | Published: 29 Jan 2016

Fortinet, Inc.

THE FIVE NEW RULES TO SECURE DYNAMIC DATA CENTERS AND CLOUDS
sponsored by Illumio
WHITE PAPER: The current security model for protecting applications in data centers and clouds is broken. We need an approach to security that protects from the inside out, and decouples security from the underlying infrastructure. Discover the 5 new rules to secure dynamic data centers and clouds in this white paper.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

There's Never Been A Better Time to Worry Less and Innovate More
sponsored by Cisco
WHITE PAPER: You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Cisco

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc.
EGUIDE: This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 13 Jun 2016 | Published: 21 Mar 2016

Dell, Inc.

Key Insights on Securing Networks Against Modern Cyber Threats
sponsored by Fortinet, Inc.
RESOURCE: Understand the capabilities, requirements and benefits of an evolved network security infrastructure. Inside, you'll see how an enterprise firewall can – and perhaps should – be the core of your security layout.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Fortinet, Inc.

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

The State of Incident Response
sponsored by ServiceNow
RESEARCH CONTENT: Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.
Posted: 13 Jun 2016 | Published: 29 Feb 2016

ServiceNow

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: To manage all things mobile, enterprise-wide security policies must be implemented. Learn how to improve mobile visibility with authorization and access policies that boast network privileges based on real-time contextual data, simple BYOD guest access, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Security Considerations for Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how endpoint compliance should be enforced in the mobile era. Access now and you'll also explore considerations that are critical for ensuring a secure network.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.
Posted: 10 Jun 2016 | Published: 27 Feb 2015

Citrix

Empowering Mobile Security with Policy Management
sponsored by Aruba Networks
WHITE PAPER: Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rules associated with legacy authentication, authorization and accounting.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE: Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.

Removing Malware and Undetectable Windows AppLocker
sponsored by Check Point Software Technologies Ltd.
EGUIDE: A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.

How to Prevent Healthcare Cybersecurity Attacks
sponsored by ServiceNow
EGUIDE: In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

ServiceNow
101 - 125 of 2748 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement