IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
126 - 150 of 3011 Matches Previous Page  |  Next Page
User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases
sponsored by LogRhythm, Inc.
DATA SHEET: Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

LogRhythm, Inc.

Secure IoT As It Advances Through Maturity Phases
sponsored by Cloudera
WHITE PAPER: This analyst report analyzes the attributes of IoT risk by industry. The framework provided helps enterprise security and risk professionals predict when the products they build or the tools they use will likely become targets of attack.
Posted: 09 Nov 2016 | Published: 07 Jan 2016

Cloudera

Web Application Firewalls are Only Part of The Answer
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to solve the fundamental security issues that plague web applications, and shut down even "zero-day" attacks. Gain the benefits of origin lockdown from malicious traffic, new threat mitigation, detailed attack logging, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Limelight DDoS Attack Interceptor
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to divert a DDoS attack and scrub the traffic before it ever reaches your enterprise. Learn how DDoS traffic can be identified, filtered, scrubbed off-site, and the passed back to your origin, all without compromising performance.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

Case Study: Alliant Credit Union Evolves Real-Time Fraud Detection
sponsored by LogRhythm, Inc.
CASE STUDY: Read this case study to determine how Alliant Credit Union automated analysis of fraud-related patterns and trends in real time, by consolidating all machine data from IT events and financial transactions on one SIEM platform.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

LogRhythm, Inc.

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016

Check Point Software Technologies Ltd.

Why Your Business Needs Enterprise-Strength Password Management
sponsored by Keeper Security Inc
WHITE PAPER: Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Keeper Security Inc

Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016

Check Point Software Technologies Ltd.

The Path Ahead for Security Leaders
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to link your identity to business value rather than limiting it to security expertise. By doing so, the security leaders of today can earn a strategic role on the executive teams of tomorrow.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Genius Project Security Guide
sponsored by Cerri.com AG
WHITE PAPER: Discover the security features you should be looking for in project management software solution. It's important for your project management software to protect your data from attacks while ensuring the availability, integrity and confidentiality.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Cerri.com AG

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Cloud IAM Buyer's Guide: Which Vendor is Right for You?
sponsored by IBM
WHITE PAPER: Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

IBM

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Healthcare Data Privacy: 5 Basic Steps to Secure Your Patient Records
sponsored by Xerox
RESOURCE: Discover 5 basic steps to securing EHRs and enacting robust patient information protection. Additionally, get tips on re-thinking your cyber incident response plan to account for new and increasing forms of ransomware that attempt to attack and impact the reputation of your organization.
Posted: 07 Nov 2016 | Published: 05 Oct 2016

Xerox

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

As Healthcare Data Expands, So Should Security
sponsored by Xerox
RESOURCE: Access this post to learn how to ensure data integrity and promote population health management (PHM) initiatives without sacrificing HIPAA compliance.
Posted: 07 Nov 2016 | Published: 29 Feb 2016

Xerox

Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Persistence Technology and Securing Every Device
sponsored by Absolute
WHITE PAPER: Learn how your security leadership can reach out and secure lost or stolen enterprise hardware. With the capacity to remotely secure potentially vulnerable endpoints, you can finally embrace a mobile workforce without exhausting concerns about security.
Posted: 07 Nov 2016 | Published: 31 Dec 2015

Absolute

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape
126 - 150 of 3011 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement