IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
176 - 200 of 2799 Matches Previous Page  |  Next Page
Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides key areas of inquiry for your board to consider. Access now and learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture for greater organizational operations overall.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Get Ahead of Threats: Securing Your Network & Application Infrastructure
sponsored by Fortinet, Inc.
EBOOK: This e-book is a collection of 24 essays from industry leaders on a broad array of network security topics. Gain tips on how to build and execute your network security plan, stay ahead of hackers, and more.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Fraud Protection Doesn't Have to Be an Uphill Battle
sponsored by IBM
WHITE PAPER: Access this white paper and find out how you can reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert

Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT: This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016

Prelert

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

AirWatch EMM Gets Windows 10 Support, Security
sponsored by VMware
EGUIDE: This e-guide provides an update on AirWatch's new privacy initiative, and teaches you the benefits of integrating the EMM tool into your business. Access now and also learn how AirWatch added Windows 10 support, and partnered with a number of security software providers to bolster its EMM tool.
Posted: 21 Apr 2016 | Published: 20 Apr 2016

VMware

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Why Application Delivery Matters in the Digital Economy
sponsored by Citrix
WHITE PAPER: Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.
Posted: 20 Apr 2016 | Published: 30 Sep 2015

Citrix

VMware identity management adds SSO to AirWatch
sponsored by VMware
EGUIDE: This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.
Posted: 20 Apr 2016 | Published: 19 Apr 2016

VMware

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to gain insider black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

2016 Security Predictions
sponsored by TrendMicro
ANALYST BRIEF: As the threats continue to mount, understanding and managing cybersecurity risks are becoming top priority for business and government decision makers, and a renewed willingness to invest in security is a notable measure of progress. Is your organization prepared for tomorrow's projected threats?
Posted: 19 Apr 2016 | Published: 15 Oct 2015

TrendMicro

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which security strategies are most effective at dealing with today's dangerous array of cyber-threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

10 Questions to Ask Your File Gateway Consolidation Vendor
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM
176 - 200 of 2799 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement