IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
201 - 225 of 2338 Matches Previous Page  | Next Page
EMM for BlackBerry 10: Features Comparison
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines an enterprise mobility management (EMM) solution that allows you to manage multiple mobile platforms and operating systems while providing the highest level of security possible.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

BlackBerry

Why the World’s Leading Businesses Trust BlackBerry
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines an enterprise mobility management (EMM) solution that allows you to manage multiple mobile platforms and operating systems while providing the highest level of security possible.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

BlackBerry

Why Enterprises Are Really Deploying NGFWs
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Fortinet, Inc.

IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

Cloud Security Begins with Asking the Right Questions
sponsored by Peak 10
WHITE PAPER: This resource discusses the problem with looking at the cloud and security as single entities and emphasizes customizing them to your needs.
Posted: 19 Mar 2014 | Published: 06 Mar 2014

Peak 10

Critical Factors to Endpoint Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc.

Establishing a Logical Perimeter: The Evolution of Network Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 19 Mar 2014 | Published: 31 Oct 2013

IBM

Neustar® SiteProtect: Intelligent DDoS Protection
sponsored by Neustar®
WHITE PAPER: This exclusive resource examines a DDoS security solution that stops attacks quickly, mitigates risks to revenue and customer experience all while eliminating the need for in-house resources.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Neustar®

UltraDNS: Performance and Security for Your Online Business
sponsored by Neustar®
WHITE PAPER: This informative paper examines DNS solution that provides you with the performance and uptime that you need while protecting against security threats that could impact availability.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Neustar®

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

Stop Fraud Before it Happens
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that offers detection, prevention, and management tools to better identify threats before they strike.
Posted: 19 Mar 2014 | Published: 31 Dec 2012

Verizon

Next Generation Network Security Guide
sponsored by TechTarget
RESOURCE: Mobile devices are exploding in enterprises everywhere. Unfortunately, managing this dynamic world of communication is complex and daunting. This guide showcases how to deploy network security devices and how to avoid deployment failures.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

TechTarget

Pocket Guide to Managing Identity in a Hybrid World
sponsored by TechTarget
RESOURCE: When it comes to managing identities and access rights, organizations have a strong hold on protecting that information, or do they? This expert guide provides an in-depth look into the latest identity and access management trends, how to manage identities in hybrid environments, when, where and how to choose a new IAM system.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Endpoint Security Technology
sponsored by TechTarget
RESOURCE: With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Five Essentials for Better Workforce Continuity – Integrating the Human Side into your Strategy
sponsored by IBM
WHITE PAPER: In this informative paper, learn about the five essential components to workforce continuity, in case of an enterprise emergency, and learn how to embrace the human element of business continuity planning.
Posted: 18 Mar 2014 | Published: 30 Nov 2013

IBM

Expert Guide to Secure Web Gateways
sponsored by TechTarget
RESOURCE: Secure web gateways are becoming more prominent amongst many organizations, but understanding how to implement it into your infrastructure is imperative for optimal performance. Participate in this survey and gain access to this expert guide providing deeper insight into different feature options into how to circumvent deployment challenges.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Key Business Differentiators Enabled by the Private Cloud
sponsored by IBM
WHITE PAPER: This paper looks at these and other private cloud differentiators, examining what they mean for the business and how best to incorporate them into your environment, based on the latest research, technologies and solutions.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

IBM

NSS Labs:  2013 Next Generation Firewall Security Value Map
sponsored by Fortinet, Inc.
WHITE PAPER: This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Building momentum: Symantec's new approach to security
sponsored by TechTarget
RESOURCE: Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Evaluating Mobile Device Management Products
sponsored by TechTarget
RESOURCE: With new mobile devices emerging in the marketplace, MDM also needs to evolve to keep pace. But with an excess of products to choose from, deploying the best MDM software to monitor your mobile workforce can be cumbersome. This guide examines the capabilities of modern MDM products and analyzes tools that help meet workforce requirements.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget
201 - 225 of 2338 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement