IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
176 - 200 of 3008 Matches Previous Page  |  Next Page
Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

Are You Confident or Complacent About Your Security?
sponsored by Absolute
WHITE PAPER: In this report, uncover the survey results of over 500 IT security professionals and what they believe is the biggest threat to organizations today, confessions on what really goes on in enterprise IT, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Absolute

How to Convince Your Board to Invest in AppSec
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to effectively express to your board why greater app layer security is paramount. See six solid arguments to bring up and discover how to get the most bang for your security buck.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Securing the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to secure your enterprise's presence on AWS and maximize your use of the public cloud. Access now to gain an in-depth understanding of how to protect both the public and hybrid cloud during and after transitioning from a traditional "brick and mortar" data center.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Fortinet, Inc.

The 2016 Economics of Web Scraping Report
sponsored by Distil Networks
WHITE PAPER: Access this report to learn how web scraper bots are a threat to your online content, how exactly these malicious bots are costing you money, and most importantly, what you can do to protect your content – and your revenue.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Distil Networks

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Why the Cloud Should Be Part of Your Data Protection Strategy
sponsored by Microsoft
WHITE PAPER: This white paper explores the role that the cloud plays in strong data protection strategies for agile IT organizations. Access now to learn more about a hybrid approach to data management and cloud-connected backups.
Posted: 01 Nov 2016 | Published: 31 Jul 2016

Microsoft

Straddling the Security Divide Between On-Premises and Cloud
sponsored by SearchSecurity.com
EZINE: Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

SearchSecurity.com

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

Accelerating Digital Transformation with Data-Driven Security (Video)
sponsored by Akamai
VIDEO: A new approach to cyber security is required to deal with bigger and badder threats. Discover how to take a data-lead approach to security. Learn how to increase your speed and accuracy when dealing with threats without sacrificing customer satisfaction through real-time threat intelligence.
Posted: 01 Nov 2016 | Premiered: 31 Oct 2016

Akamai

The Rise of Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover eye-opening statistics about the ever-increasing ransomware problems against today's enterprises. Learn what types of attacks are taking place, where these attacks are taking place and what you can do to best protect your organization from financial and brand name disaster.
Posted: 01 Nov 2016 | Published: 01 Sep 2016

Barracuda Networks

User Behavioral Analytics Tools Can Thwart Security Attacks
sponsored by Preempt Security
EGUIDE: Inside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Preempt Security

The Ultimate Guide to Preventing Account Takeover
sponsored by Distil Networks
WHITE PAPER: 46% of internet traffic is composed of bots at any given time performing automated tasks or mimicking human behavior. Access this resource to uncover the 7 steps to mitigate account take over bots, how to under their purpose and how to stop them in their tracks.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Distil Networks

Uncover Often Overlooked Holes in Your Security
sponsored by Dell SecureWorks
WHITE PAPER: Learn how a second opinion on your security policies could be beneficial in ways that could surprise your organization. Access now to discover improved cybersecurity safeguards, how to close hidden exposure to unknown external web connections, and more.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Dell SecureWorks

The SecOps Playbook
sponsored by ThreatStack
WHITE PAPER: Make SecOps a reality at your organization. The goal of SecOps is to help companies deliver software more efficiently and more securely. This resource offers a brief history of SecOps and six steps to get off the ground with a successful program for your enterprise.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

ThreatStack

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

User and Entity Behavior Analytics and Adaptive Response
sponsored by Preempt Security
WHITE PAPER: The majority of confirmed data breaches involved attackers posing as legitimate users or users maliciously wielding their access. Learn how to go beyond user and entity behavior analytics with proactive measures to preempt potential insider threats or breaches.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Preempt Security

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Case Study: WCA Hospital Eliminates Dual Prescribing Workflows and Increases Patient Satisfaction
sponsored by Imprivata
CASE STUDY: Learn how WCA Hospital implemented EPCS in order to improve their patient's experience with prescriptions, eliminate dual prescribing workflows, and improve provider satisfaction.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Imprivata

Endpoint Security Suite Evaluations
sponsored by Carbon Black
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 27 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Benefits of Security Intelligence Services
sponsored by Kaspersky Lab
WHITE PAPER: This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.
Posted: 27 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Closing the Circle of Network Security Defense
sponsored by Kaspersky Lab
WHITE PAPER: Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Kaspersky Lab

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM
176 - 200 of 3008 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement