IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
176 - 200 of 3087 Matches Previous Page  |  Next Page
Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

CW Nordics August 2017
sponsored by ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 23 Aug 2017 | Published: 24 Aug 2017

ComputerWeekly.com

Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

Investigate attacks like never before
sponsored by Cisco Umbrella
RESOURCE: Dive into this interactive resource and learn about a truly innovative approach to security that allows you to drastically cut down on the noise from alerts. Access now and see for yourself how this system delivers an intuitive, single source of security intelligence that can allow you to investigate and eliminate the most critical threats.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Cisco Umbrella

Surviving the IT Security Skills Shortage
sponsored by Arctic Wolf Networks, Inc.
EBOOK: 82% of organizations want to keep their security staff at the same level or increase it. At the same time, there is a shortage of cybersecurity people. Access this e-book examines the struggles in recruiting and retaining security professionals with the necessary types and levels of skills.
Posted: 21 Aug 2017 | Published: 31 May 2017

Arctic Wolf Networks, Inc.

Shattering the Single Pane of Glass Management Model
sponsored by JAMF
RESOURCE: 82% of organizations use two or more enterprise mobility management solutions. There is no one-size-fits-all approach to device and OS management. Download this infographic to discover how you could benefit from managing by ecosystem, instead of a single pane of glass management model.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Computer Weekly – 22 August 2017: How banking technology has changed since the crash
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.
Posted: 18 Aug 2017 | Published: 22 Aug 2017

ComputerWeekly.com

Discover a Database and Big Data Scanner
sponsored by Trustwave
WHITE PAPER: This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

Stop Ransomware in its Tracks
sponsored by Cisco Umbrella
RESOURCE CENTER: In this resource center, explore the many facets of ransomware through several available resources and even enjoy a little embed game to lighten the mood.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Cisco Umbrella

How to simplify your workspace with UEM
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cybersecurity report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.
Posted: 15 Aug 2017 | Published: 31 Jul 2017

Mimecast

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

How to Balance Performance and Security When Connecting Branch Offices to the Public Cloud
sponsored by Cisco Umbrella
RESEARCH CONTENT: This Gartner report explores 5 recommendations for solving 2 app performance challenges, network performance key considerations, security policy considerations, tips to help you determine the right approach for your organization, and more.
Posted: 10 Aug 2017 | Published: 17 Oct 2016

Cisco Umbrella

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Security's New Frontier: The Cloud
sponsored by Cisco Umbrella
EBOOK: By 2018, SaaS usage is expected to increase 70% and security can't wait any longer. Inside this e-book, uncover how to securely adopt and use the cloud to better manage security policies and gain visibility beyond the perimeter.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Cisco Umbrella

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Cybersecurity Readiness: 2017 Survey Results
sponsored by Solarwinds MSP
WHITE PAPER: Survey results suggest that IT providers are confident of their cybersecurity preparedness. But is this confidence misplaced? Learn the results in the report and uncover why overconfidence may be leading to more data security breaches.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Solarwinds MSP

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.
176 - 200 of 3087 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement