IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
201 - 225 of 3031 Matches Previous Page  |  Next Page
Migration to Exchange Online and Office 365: A Step-by-Step Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: For IT administrators who have not been involved in a previous migration to Office 365, there is a steep learning curve. In this step-by-step guide, learn how to select the migration option that makes most sense for your organization to ensure future success and reliable security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Hewlett Packard Enterprise

Beginner's Guide to Hybrid Cloud Security
sponsored by AlienVault
WHITE PAPER: Learn everything you need for a successful hybrid cloud deployment, including: the cloud security shared responsibility model, how familiar network security challenges persist in the cloud, what new security challenges emerge in the cloud, and a smarter approach to threat detection in hybrid cloud security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

AlienVault

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

ISC2 CCSP
sponsored by ISC2
WHITE PAPER: Examine the relationship between IT and the C-suite, as well as the rise of the cloud security professional as an emerging voice within IT and the business.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

ISC2

How to Gain Passive DNS for Enhanced Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Access this white paper to discover how improving your DNS data collection can enhance your threat intelligence, give you faster, more accurate detection/mitigation abilities vs cyberattacks, and more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

Farsight Security

Your Guide To Today's Cloud Security Adoption Trends
sponsored by ISC2
WHITE PAPER: Security of critical data systems remain a key barrier to adoption of cloud services. In this comprehensive cloud security report discover cloud adoption trends, top cloud security challenges, paths to stronger cloud security, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

ISC2

Evolving Your Business with IoT: Six Steps to a Secure Digital Transformation
sponsored by Appdirect
WHITE PAPER: Discover 6 steps to have your organization undergo a secure IoT digital transformation and enable new types of innovation, creativity, and business models.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Appdirect

Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell EMC - CSG & DT
RESEARCH CONTENT: In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Dell EMC - CSG & DT

Fourth Generation Data Leak Prevention
sponsored by Ghangor Cloud
WHITE PAPER: In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.
Posted: 05 Apr 2017 | Published: 31 Jan 2017

Ghangor Cloud

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

How-to Guide: Local, Remote, and Centrally Unified Key Management
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover a unified encrypting data and key management approach with strong access controls that deliver reliable security, ensuring continuous and appropriate availability to keys while supporting audit and compliance requirements.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

Hewlett Packard Enterprise

How the World's Leading Engineering Design Automation (EDA) Firm Protects Intellectual Property
sponsored by Ghangor Cloud
CASE STUDY: In this short case study, learn how a leading engineering design automation firm was able to secure their intellectual property and end serious security incidents with an advanced security platform.
Posted: 04 Apr 2017 | Published: 31 Jan 2017

Ghangor Cloud

How Proper Key Management Can Protect Your Data
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With a shift on the threat landscape from simple to sophisticated, ensuring the highest level of reliability, availability, and disaster recovery seems a lofty goal. Discover what role key management can play in critical data protection and business continuity architecture.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

Hewlett Packard Enterprise

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

Optimizing, Protecting and Analyzing Your Backup Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this resource, learn how you can get the actionable insight and operational analytics needed to optimize backup at all phases of the data protection cycle.
Posted: 04 Apr 2017 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

Farsight Security

The Evolving Role of Managed Security Service Providers
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, we look at the evolution of the managed security provider and why services are the fastest-growing part of security.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

SearchSecurity.com

The Future of DLP is Automation
sponsored by Ghangor Cloud
WHITE PAPER: Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.
Posted: 03 Apr 2017 | Published: 30 Mar 2017

Ghangor Cloud

Top Internet of Things Security Concerns
sponsored by Peak10
WHITE PAPER: 70% of IoT ready devices are vulnerable to hackers, and it doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.
Posted: 03 Apr 2017 | Published: 02 Mar 2017

Peak10

See How a Major National Security Agency Protects its Sensitive Data
sponsored by Ghangor Cloud
CASE STUDY: Discover how a leading southeast Asian country's national security agency recently upgraded their data leak prevention mechanisms. Learn how they were able to safeguard sensitive national security information, financial transaction information and other confidential mission critical information.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Ghangor Cloud

How The Mirai Botnet is Fueling Today's Largest and Most Crippling DDoS Attacks
sponsored by Akamai
WHITE PAPER: The largest DDoS attacks have increased greatly in strength and doubled in attack size in 2016. Access this whitepaper to uncover how to defend against DDoS attacks and stay ahead of the malicious threats like the Mirai botnet.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

7 Critical Considerations for Choosing a Cloud Security Provider
sponsored by Akamai
WHITE PAPER: Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud and uncover the 7 key factors to consider when evaluating a cloud provider.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai
201 - 225 of 3031 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement