IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
201 - 225 of 3009 Matches Previous Page  |  Next Page
Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Case Study: WCA Hospital Eliminates Dual Prescribing Workflows and Increases Patient Satisfaction
sponsored by Imprivata
CASE STUDY: Learn how WCA Hospital implemented EPCS in order to improve their patient's experience with prescriptions, eliminate dual prescribing workflows, and improve provider satisfaction.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Imprivata

Endpoint Security Suite Evaluations
sponsored by Carbon Black
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 27 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Benefits of Security Intelligence Services
sponsored by Kaspersky Lab
WHITE PAPER: This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.
Posted: 27 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Closing the Circle of Network Security Defense
sponsored by Kaspersky Lab
WHITE PAPER: Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Kaspersky Lab

IT Security 101: Thinking Like a Cybercriminal?
sponsored by LogicNow
EBOOK: Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

LogicNow

Modernize Your Data Center Security
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

Data Protection in Two Dimensions
sponsored by EOH IBM
WHITE PAPER: Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.
Posted: 27 Oct 2016 | Published: 01 Jan 2016

EOH IBM

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization can meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

Application Security Assessment
sponsored by Kaspersky Lab
WHITE PAPER: Access this overview of an app security assessment that uncovers and mitigates vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

Choosing The Right Two-Factor Authentication Solution for Healthcare
sponsored by Imprivata
WHITE PAPER: Learn why using two-factor authentication puts your healthcare organization miles ahead in terms of protecting your electronic records.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

Imprivata

A Look at the Top Mobile Security Obstacles
sponsored by TechTarget
RESOURCE: With employees bringing an increasing number of unsecure personal devices into the workplace each day, implementing proactive mobile security measures should be a top priority for every IT department. Fill out our brief Mobile Security Checklist to access our guide on minimizing mobile data security threats.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

TechTarget

Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

Increase Oracle Database Security Without Application Performance Loss
sponsored by Oracle Corporation UK Ltd
ANALYST REPORT: Learn how to implement strong security policies for Oracle Database. Uncover best practices to safeguard data while optimizing performance and increasing application availability.
Posted: 26 Oct 2016 | Published: 18 May 2016

Oracle Corporation UK Ltd

2016 Defense Report Cyberthreat for Financial Services
sponsored by Imperva
RESOURCE: This infographic succinctly lays out the state of affairs for IT security in the financial industry. Access now to see exactly how finance stacks up against other industries when it comes to securing users, applications, and infrastructure.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Imperva

2016 Defense Report: Cyberthreats to Government
sponsored by Imperva
RESOURCE: This infographic succinctly lays out the state of affairs for IT security in government agencies. Access now to see exactly how government agencies stack up against other industries when it comes to protecting users, applications, and infrastructure.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Imperva

SECURITY INVESTIGATION, DETECTION & RAPID RESPONSE WITH SPLUNK ENTERPRISE
sponsored by Splunk
WHITE PAPER: In this technical white paper, learn how to strengthen your overall security posture by simply interacting and exploring your data to find evidence of an infection or a breach. Learn how to use Splunk to search for keywords, terms or values to gain critical insights into your security posture.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Splunk

Bridge the Network Security Gap in IP Multifunction Machines
sponsored by HP
EGUIDE: In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

HP

Creating a Secure Cloud Infrastructure
sponsored by Oracle Corporation UK Ltd
VIDEO: Discover how you can gain higher levels of security, efficiency and performance for your data center while making a path to the cloud. Encrypt and decrypt at full speed with zero performance impact and guard against top memory-based attacks.
Posted: 25 Oct 2016 | Premiered: 30 Sep 2016

Oracle Corporation UK Ltd

Endpoint Security Suite Evaluations
sponsored by Trend Micro
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 25 Oct 2016 | Published: 19 Oct 2016

Trend Micro

Intelligence Reporting: Answers to Your Security Questions
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab
201 - 225 of 3009 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement