IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
226 - 250 of 2732 Matches Previous Page  | Next Page
Reduce Security Breaches and Manage Risk with a Fax Security Strategy
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Use Cloud-Based Fax Messaging to Improve The Security of Healthcare Information
sponsored by OpenText
WHITE PAPER: In this resource, learn how one cloud-based fax messaging solution will secure patients' information at a low cost and meet federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: Inside this informative white paper, explore a new Enterprise Mobility Management (EMM) solution which makes it easy to create, manage, and secure apps on any device.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

The 2014 Next Generation Firewall Challenge
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

Five Program Management Best Practices When Designing App Security
sponsored by Veracode, Inc.
WHITE PAPER: Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
BROCHURE: This brochure explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013

HID

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 18 Aug 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Acceptable Use: How to Write a Mobility Policy Document Employees Will Actually Follow
sponsored by BlackBerry
WHITE PAPER: A mobile computing policy document tells employees what's expected of them when it comes to using these devices for work. It marks out the responsibilities of the company as well.Read this white paper to find out how to write a mobile policy document that employees will understand and follow
Posted: 18 Aug 2014 | Published: 22 Jul 2014

BlackBerry

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Security Solutions: Balancing Protection and Productivity
sponsored by BlackBerry
WHITE PAPER: In this in-depth white paper, explores security solutions that provide transparent security, integrated containerization for simply application development and deployment, and a more optimal user experience.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

BlackBerry

Get Ready to Halt Cyber Attacks With IPS In Place
sponsored by HP and Intel
CASE STUDY: This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

HP and Intel

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

Mitigating Security & Compliance Risks with EMM
sponsored by BlackBerry
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 13 Aug 2014 | Published: 31 May 2014

BlackBerry

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett-Packard Company

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company
226 - 250 of 2732 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement