IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
226 - 250 of 2629 Matches Previous Page  |  Next Page
Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Your Guide to the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Case Study: Closing in on China's Unit 78020
sponsored by ThreatConnect
WHITE PAPER: This report explores how a Chinese cyber-espionage group known as Unit 78020 was discovered with an advanced intrusion analysis strategy.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

From Checkboxes to Frameworks: How CISOs Enhance Their Security Strategies
sponsored by IBM
WHITE PAPER: Access this survey report to learn how CISOs are reworking their security strategies and implementing actionable plans to combat today's growing threats.
Posted: 11 Dec 2015 | Published: 31 Oct 2015

IBM

Best Practices for Improving Security and Productivity with IAM
sponsored by ForgeRock
EGUIDE: This expert guide suggests some best practices for making the most of your IAM strategies. Discover how to implement cloud IAM products and services and how streamlining IAM is essential to exploiting your organization's assets and employee productivity.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ForgeRock

Global Investment Bank Case Study
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this case study learn how Global Investment bank was able to eliminate hundreds of firewalls as it consolidated its data centers, resulting in stronger pereimeter security from advanced threats, at a significantly lower cost.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Securing the Datacenter from Advanced Threats
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource learn how datacenter security is now driven by highly sophisticated attackers, with targeted attacks on financial datacenter resources, customer reputation, and regulatory oversight. Security strategies are at the top of the agenda as CISOs remain focused on a multitude of enterprise risks.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

Mobile Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report examines how mobile workers perceive the risks associated with using sensitive data in public places and how they go about mitigating those risks.
Posted: 10 Dec 2015 | Published: 31 Dec 2012

OptioLabs

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cyber insecurity, and how enterprises can deploy a new sophisticated platform for providing network defense. Specifically, you'll find out how to detect and prevent attacks at every stage of the attack lifecycle.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Sensible one-page thoughts on performance: Responsibility
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ludo Houdenaert, an independent management consultant, reflects on the problems that can occur when there is a mismatch between employees' authority and responsibility.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

ComputerWeekly.com

The Curious Case of API Security: Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This resource delves into the top threats facing APIs, exploring how these attacks are carried out and how you can thwart them. Read on to learn how to keep your APIs secure.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Axway

Sensible one-page thoughts on performance: People at work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

ComputerWeekly.com

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

A Guide to UC Cloud Services Providers and Their Security Measures
sponsored by Carousel Industries
EGUIDE: In this expert e-guide, you will discover the best practices for deploying cloud-based UC platforms. Read this exclusive guide now to assuage your UC fears about encryption and multi-tenancy, and bolster your UC cloud platform security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Carousel Industries

The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO: This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015

Unisys

Demo: What Can Managed Security Services Do for You?
sponsored by IBM
WEBCAST: This video provides a demonstration of a managed security services portal. View now and discover how you can improve security, reduce cost and lower risk in your organization.
Posted: 19 Nov 2015 | Premiered: Apr 12, 2013

IBM

Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE: Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015

Unisys

Identity and Access Management Users Maximize Their ROI
sponsored by ForgeRock
WHITE PAPER: Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

7 Reasons to Consider DRaaS
sponsored by IBM
WHITE PAPER: This interactive white paper presents 7 reasons why you need a resilient, cloud-based disaster recovery plan in place to protect data and operations.
Posted: 08 Dec 2015 | Published: 23 Apr 2015

IBM
226 - 250 of 2629 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement