IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
126 - 150 of 2907 Matches Previous Page  |  Next Page
The Evolution and Impact of Hidden Mobile Threats
sponsored by Wandera
WHITE PAPER: Learn to protect your mobile workforce and their devices comprehensively in this white paper. Uncover the many attack vectors malicious users and programs use to target vital enterprise and personal data, and how to plug any gaps you many have in your defenses.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Wandera

How Trend Micro Stacks Up among Endpoint Protection Vendors
sponsored by TrendMicro
WHITE PAPER: This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

The New Security Paradigm for Enabling Digital Workers: 4 Pillars of Success
sponsored by Unisys
WHITE PAPER: Security in the digital age should be increasingly fine-grained, broad-based, targeted, convenient, and intrinsic to products and applications. Uncover immediate steps you can begin taking to better prepare for ongoing security challenges due to the cloud, mobility, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Unisys

3 Key Steps to Securing Critical Infrastructure
sponsored by Unisys
WHITE PAPER: In this video, Tom Patterson, VP and GM of Unisys Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

TRC Case Study: Securing the Multi-Cloud Environment
sponsored by TrendMicro
CASE STUDY: Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs.
Posted: 26 Aug 2016 | Published: 31 May 2016

TrendMicro

How Security has Failed us, and what you Can Do
sponsored by Unisys
WHITE PAPER: Find out what Unisys Global Security Solutions GM, Tom Patterson, has to say about the state of security. Discover ways legacy systems have failed us, and what needs to be done to keep us safe.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

Quantifying the Riskand Economic Impactof Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Enterprise Security: What Erodes Confidence
sponsored by Unisys
WHITE PAPER: True security experts know that it's time to lay simplistic perimeter defenses to rest – before they continue to drain your resources. Explore this interview with Unisys' Chris Kloes as he offers insights from a recent security study.
Posted: 26 Aug 2016 | Published: 29 Apr 2016

Unisys

Fast Track Your Office 365 Deployment and Beyond
sponsored by OneLogin
WEBCAST: Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.
Posted: 26 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

Online Archiving Now Easier Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

Case Study: Cut Mobile Data Costs and Bolster Security
sponsored by Wandera
CASE STUDY: Discover how Hillcrest identified and addressed its mobile data usage problem, and now is enjoying annual savings of roughly €34,700, equating to an 850% ROI. Learn how it cut its mobile bills by 68% and also protects its workers from browser malware, leaking apps, phishing attacks, poisoned cache exploits, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Wandera

Interview: One Trust Leader reveals how Security breeds Innovation
sponsored by Unisys
WHITE PAPER: The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Unisys

The Need For Comprehensive Email Security Is Greater Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how to keep your email secure, easily and affordably. Learn about how to deploy an adaptive spam defense, sophisticated threat detection, email continuity, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

10 Reasons to Archive Your Email in the Cloud
sponsored by LogicNow
WHITE PAPER: Discover why archiving your email in the cloud can give your enterprise security and compliance advantages, plus other important benefits, such as: hitting the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Juniper Networks, Inc.

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Real-Time Voice Authentication at the Call Center
sponsored by NICE Systems, Inc
WHITE PAPER: Biometrics offers one of the best opportunities to improve security and the customer experience. Discover how your enterprise can reduce handle time by 25 to 45 seconds, save significantly in the call center, and more.
Posted: 23 Aug 2016 | Published: 31 May 2016

NICE Systems, Inc

How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Network Security Alternatives for the Cloud
sponsored by TrendMicro
WHITE PAPER: Discover a blow-by-blow comparison of how to best deploy IDS/IPS functionality to protect cloud instances. Learn the differences in IDS/IPS approaches, what organizations can do to meet compliance requirements, how they defend against threats, and more.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

TrendMicro

Security Strategies for the Financial Sector
sponsored by Unisys
WHITE PAPER: Financial institutions must tighten security to stop threat actors, or they could create a chain reaction and cripple world trade. Access this resource to learn about tools with a history of stopping cybercrime in the banking industry.
Posted: 23 Aug 2016 | Published: 29 Jul 2016

Unisys

Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow
126 - 150 of 2907 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement