IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
101 - 125 of 3136 Matches Previous Page  |  Next Page
Protecting Data in the Healthcare Industry
sponsored by Mimecast
RESEARCH CONTENT: The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.
Posted: 21 Aug 2017 | Published: 31 Jul 2017

Mimecast

Surviving the IT Security Skills Shortage
sponsored by Arctic Wolf Networks, Inc.
EBOOK: 82% of organizations want to keep their security staff at the same level or increase it. At the same time, there is a shortage of cybersecurity people. Access this e-book examines the struggles in recruiting and retaining security professionals with the necessary types and levels of skills.
Posted: 21 Aug 2017 | Published: 31 May 2017

Arctic Wolf Networks, Inc.

Security Tech: Out with the Old in with the New
sponsored by Citrix
RESOURCE: Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Shattering the Single Pane of Glass Management Model
sponsored by JAMF
RESOURCE: 82% of organizations use two or more enterprise mobility management solutions. There is no one-size-fits-all approach to device and OS management. Download this infographic to discover how you could benefit from managing by ecosystem, instead of a single pane of glass management model.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Computer Weekly – 22 August 2017: How banking technology has changed since the crash
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.
Posted: 18 Aug 2017 | Published: 22 Aug 2017

ComputerWeekly.com

Discover a Database and Big Data Scanner
sponsored by Trustwave
WHITE PAPER: This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

Stop Ransomware in its Tracks
sponsored by Cisco Umbrella
RESOURCE CENTER: In this resource center, explore the many facets of ransomware through several available resources and even enjoy a little embed game to lighten the mood.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Cisco Umbrella

Mac Endpoints Move Into The Enterprise - and Into The Crosshairs of Hackers
sponsored by Palo Alto Networks
WHITE PAPER: Mac computers used to be safe havens—impregnable bunkers—that attackers couldn't figure out how to get into...until now. The threat landscape for Macs is seeing rapid growth. Access this white paper to learn which method is working to prevent malware.
Posted: 17 Aug 2017 | Published: 03 Jul 2017

Palo Alto Networks

Taking Managed Services to the Next Level
sponsored by Datto, Inc.
EBOOK: As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

The New Face of Cloud-Based Access management
sponsored by Gemalto
WHITE PAPER: Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

How to Bolster Endpoint Security Protection
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec & Blue Coat Systems

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Recent SC Media research reveals that 46% of security pros expect threat intelligence to be a very important part of their strategy. This white paper takes an in-depth look into threat intelligence, one of the most talked-about areas of information security.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

4 Steps to Cloud Access Management
sponsored by Gemalto
WHITE PAPER: While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe and profitable.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Gemalto

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.
Posted: 15 Aug 2017 | Published: 31 Jul 2017

Mimecast

Remediation and Mitigation for Windows Active Directory Security
sponsored by Quest
WHITE PAPER: Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Quest

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Customers Showcase Security Success
sponsored by Splunk
EBOOK: Data security is vital for companies in protecting sensitive business and customer data. Read this e-book to uncover 15 customer success stories and learn more about analytics-driven security and how to maintain an uninterrupted business.
Posted: 14 Aug 2017 | Published: 07 Aug 2017

Splunk

Protecting the Hybrid Cloud from Advanced Threats
sponsored by TrendMicro
WHITE PAPER: With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

TrendMicro

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

How to Balance Performance and Security When Connecting Branch Offices to the Public Cloud
sponsored by Cisco Umbrella
RESEARCH CONTENT: This Gartner report explores 5 recommendations for solving 2 app performance challenges, network performance key considerations, security policy considerations, tips to help you determine the right approach for your organization, and more.
Posted: 10 Aug 2017 | Published: 17 Oct 2016

Cisco Umbrella
101 - 125 of 3136 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement