IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
126 - 150 of 2579 Matches Previous Page  |  Next Page
Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

Why the Security Industry Needs to Adjust to the New CASB Market
sponsored by IBM
EGUIDE: Learn from experts Rob Wright and Dave Shackleford as they discuss the domination of startups in the suddenly hot cloud access security broker market and what will happen if larger vendors decide to join the party.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

Steps to Reducing the Shadow Cloud Threat
sponsored by IBM
EGUIDE: Shadow cloud threatens enterprise security but there are ways to lessen the risks and protect organizations' systems and applications. Read this expert eGuide to discover how to protect yourself. Uncover key steps to reducing the shadow cloud threat in your business.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

IBM

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Protect Against Email-Borne Threats
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how advanced threat protection can uncover and prioritize sophisticated attacks entering your organization through email. Discover how you can leverage targeted attack identification, detailed malware reporting, data correlation, a consolidated view of attacks across endpoints, networks, and email, and more.
Posted: 02 Dec 2015 | Published: 31 Oct 2015

Symantec Corporation

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: This article explains how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise. Read on to learn the benefits of integrating this technology with enterprise mobility management (EMM) tools.
Posted: 01 Dec 2015 | Published: 04 Nov 2015

IBM

Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative white paper outlines 10 best practices for successful SIEM implementation.
Posted: 01 Dec 2015 | Published: 19 Dec 2012

AccelOps Inc.

Reimagining Security: A New Way to Think
sponsored by IBM
VIDEO: Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.
Posted: 01 Dec 2015 | Premiered: 07 Apr 2015

IBM

Advanced Threat Protection Strategies for your Network
sponsored by Symantec Corporation
DATA SHEET: This data sheet offers strategies for uncovering veiled threats that infiltrate organizations by leveraging your network protocols. Access now to find out how you can expose these attacks and optimize network security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Symantec Corporation

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

A Guide to UC Cloud Services Providers and Their Security Measures
sponsored by Carousel Industries
EGUIDE: In this expert e-guide, you will discover the best practices for deploying cloud-based UC platforms. Read this exclusive guide now to assuage your UC fears about encryption and multi-tenancy, and bolster your UC cloud platform security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Carousel Industries

Report: 2015 Cybersecurity Intelligence Index
sponsored by IBM
WHITE PAPER: In this report, you'll uncover the major threats to businesses worldwide over recent years, and how companies can better detect and insulate themselves from future attacks in the face of new technology.
Posted: 30 Nov 2015 | Published: 31 Jul 2015

IBM

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Bring Security and Efficiency to Healthcare with Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: This white paper explains how cloud computing can help you more efficiently share patient information without putting any of that sensitive data at risk.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

8x8, Inc.

Preventing Attacks Before They Happen
sponsored by Check Point Software Technologies Ltd.
EGUIDE: While no antimalware product will ever be 100% effective, there are solutions that can successfully ward off advanced attacks. This expert guide gives advice for finding the best solution for your environment.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Check Point Software Technologies Ltd.

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Security Information and Event Management FAQs
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.
Posted: 20 Nov 2015 | Published: 30 Nov 2011

AccelOps Inc.

Security, Performance, and Availability Monitoring Solutions for Today's Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to discover the challenges MSPs face and how they can gain full visibility and control of their customers' entire infrastructure – servers, storage, virtualized server and storage, networks, security devices, applications and users – all from a single pane of glass.
Posted: 19 Nov 2015 | Published: 15 Mar 2013

AccelOps Inc.

Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Check Point Software Technologies Ltd.

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.
126 - 150 of 2579 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement