IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
201 - 225 of 2368 Matches Previous Page  | Next Page
Reduce e-Commerce Fraud without Increasing Customer Friction for e-Commerce
sponsored by ThreatMetrix
WHITE PAPER: This guide discusses how to reduce e-commerce fraud without affecting your end-user experience.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

The New Windows Security: Achieving PC Lockdown without User Backlash in Five Easy Steps
sponsored by Dell and Microsoft
WHITE PAPER: Read this informative white paper and discover 5 easy steps for achieving PC security without affecting your end user experience.
Posted: 25 Mar 2014 | Published: 16 Sep 2013

Dell and Microsoft

ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014

Hewlett-Packard Company

How to Leverage Log Data for Effective Threat Detection
sponsored by AlienVault
WHITE PAPER: Watch this webcast now to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

AlienVault

Avoiding Stealth Cyber Attacks
sponsored by Peak 10
WHITE PAPER: In this article, learn how stealth attacks are becoming more common, and what measures should be taken in order to keep data protected.
Posted: 24 Mar 2014 | Published: 11 Feb 2014

Peak 10

Five Trends to Track in E-Commerce Fraud
sponsored by ThreatMetrix
WHITE PAPER: This paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Using Privacy as a Business Differentiator
sponsored by Peak 10
WHITE PAPER: Click through for a discussion on contextual privacy, and what businesses should do in order to balance new opportunities with data protection.
Posted: 24 Mar 2014 | Published: 11 Feb 2014

Peak 10

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

What to Look for When Evaluating Next-Generation Firewalls (Edu)
sponsored by Dell Software
WHITE PAPER: This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality.
Posted: 24 Mar 2014 | Published: 10 Dec 2012

Dell Software

AlienVault Unified Security Mangement: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Evaluate: IBM Endpoint Manager
sponsored by IBM
TRIAL SOFTWARE: This 30-day trial offers an endpoint manager that provides a single-agent, single-console approach to lifecycle management, security, and endpoint protection.
Posted: 21 Mar 2014 | Premiered: 21 Mar 2014

IBM

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 21 Mar 2014 | Published: 30 Nov 2013

Dell, Inc.

International Mobile Security: Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
sponsored by Cisco
WHITE PAPER: This white paper features a flexible, modular approach to mobile strategies that ensures optimum user access and experience, while offering robust security.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Universities Have Much to Teach Cyber Thieves, Regrettably
sponsored by Peak 10
WHITE PAPER: Read this resource to gain insight on what steps institutions of higher education should take in leveraging IT tools to boost data protection strategies.
Posted: 21 Mar 2014 | Published: 04 Mar 2014

Peak 10

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


Major Bank Solves Lost Laptop Problems Through Encryption
sponsored by Dell, Inc.
CASE STUDY: This white paper dives deep into a case study of a large bank that decided to get a jump on encrypting data long before it became a regulatory requirement. Inside, learn why they chose one vendor's solution to manage all endpoint protection products from a single cross-platform management console.
Posted: 20 Mar 2014 | Published: 31 May 2013

Dell, Inc.

Heartland Payment Systems: Neustar UltraDNS Case Study
sponsored by Neustar®
CASE STUDY: This informative case study discusses how a financial transaction service organization was able to utilize a security tool to virtually eliminate downtime through 24/7 monitoring and DDoS protection.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

End Point Security in Medium and Large Organizations
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell, Inc.

Binary Option: Neustar SiteProtect Case Study
sponsored by Neustar®
CASE STUDY: This exclusive case study examines how an independent trading website was able to utilize a security service that protects against DDoS attacks 24/7, mitigating the attack when it occurs and escalating when needed.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Evaluating Cloud Computing Services: Criteria to Consider
sponsored by FireHost Inc.
EGUIDE: This expert e-guide covers the extra protection you can get from a cloud service provider. It also will help you decide what to consider when choosing a cloud provider.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

FireHost Inc.

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42
201 - 225 of 2368 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement