IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
101 - 125 of 2814 Matches Previous Page  | Next Page
Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel® Services
WHITE PAPER: This white paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope"―which include any network components that are the primary focus of PCI DSS regulation, compliance, and assessment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

PCI DSS Tokenization Buyer’s Guide
sponsored by Intel® Services
WHITE PAPER: The guide describes how tokenization works, and how retailers and other businesses can deploy it to reduce risks of data compromise and the cost of PCI compliance.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Intel® Mashery™ API Gateway - Tokenization
sponsored by Intel® Services
WHITE PAPER: Intel® Mashery™ API Gateway - Tokenization is a hardware or software appliance that dramatically simplifies PCI DSS & PII compliance and administration for organizations across all industry types that accept, capture, store, transmit or process credit card, debit card, or sensitive personal data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Using the System Center Updates Publisher to Security Path 3rd Party Apps with WSUS
sponsored by Lumension
WEBCAST: In this webcast, IT security expert Randy Franklin Smith of Ultimate Windows dives into how Microsoft System Center Updates Publisher (SCUP) works and what the requirements are for deploying third party security updates with SCUP.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Lumension

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

TaaSera

What are the Barriers to Improving IT Security?
sponsored by Icomm Technologies
VIDEO: This exclusive video explains why you must keep updating IT security to protect against evolving threats.
Posted: 05 Nov 2014 | Premiered: 05 Nov 2014

Icomm Technologies

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

Using PCI DSS Criteria for PII Protection
sponsored by Intel® Services
WHITE PAPER: This white paper describes how organizations can benefit from using PCI guidelines and solutions for PII data compliance, and also introduces a compliance and data protection gateway that helps organizations to achieve data protection for both PII and PCI data through data tokenization and format-preserving encryption.
Posted: 04 Nov 2014 | Published: 31 Jul 2014

Intel® Services

The Most Damaging Security Attacks Against Web Infrastructures Today
sponsored by Akamai Technologies
WEBCAST: Drawing on recent research from Forrester, this short video discusses web application attacks and distributed denial of service (DDoS) attacks, two of the most serious threats to modern enterprises.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Akamai Technologies

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services

Your Critical Missing Security Vantage Point
sponsored by ObserveIT
WHITE PAPER: This white paper explains why user activity monitoring is critical in order to address the problem associated with users.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

IT Security and Firewalls
sponsored by Icomm Technologies
VIDEO: This valuable video explores this issue and provides detailed information on the results of a study that can help you identify where your defenses are weak and how to fortify them.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Your Number One IT Security Tip is...
sponsored by Icomm Technologies
VIDEO: Tune in to this exclusive video now to learn the top tip for IT managers whose businesses are still likely vulnerable to attack.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Free Trial: ObserveIT User Activity Monitoring
sponsored by ObserveIT
TRIAL SOFTWARE: ObserveIT enables you to identify and investigate suspicious user activity across your entire environment. Register for a free trial now and gain access to the full range of ObserveIT Enterprise features for 15 days.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

ObserveIT

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Web Applications Under Attack: How Network Security Solutions Leave You Exposed
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls—web application firewalls and next generation firewalls—measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP).
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Imperva

How Often Should IT Security and Firewalls be Upgraded?
sponsored by Icomm Technologies
VIDEO: Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies

Why Senior Executives Should Care about Firewalls and Gateway Security
sponsored by Icomm Technologies
VIDEO: This exclusive video will help you make a business case to senior executives on why they need to invest in a next-generation firewall.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies

Selecting The Right Cloud Deployment (with Security in Mind)
sponsored by CDW Corporation
VIDEO: Watch this informative video to learn the important steps for selecting and implementing the right cloud infrastructure for your business, and also learn about the top concern with implementing the cloud – security.
Posted: 29 Oct 2014 | Premiered: 24 Jun 2014

CDW Corporation

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation

An Approach to Security Frameworks
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will show you how to meet compliance frameworks while also improving security levels.
Posted: 29 Oct 2014 | Published: 23 Sep 2014

Symantec Corporation
101 - 125 of 2814 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement