IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
226 - 250 of 2560 Matches Previous Page  | Next Page
Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett-Packard Company

Security: Examining the Heartbleed Bug
sponsored by Hewlett-Packard Company
WEBCAST: This exclusive webcast discusses security solution that identifies and addresses bugs in your network that can potentially leak sensitive information. Tune in now to find out more.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Hewlett-Packard Company

Market Trends - Secure File Sharing and Collaboration in the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions.
Posted: 02 Jun 2014 | Published: 04 Feb 2014

Accellion, Inc.

451 Research - The Cloud App Controol Market
sponsored by SkyHigh
WHITE PAPER: This resource highlights a set of cloud security solutions that offer leading discovery, analysis, and control capabilities to help you best protect your cloud applications.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

SkyHigh

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

A Security Survey of Strong Authentication Technologies
sponsored by SafeNet, Inc.
WHITE PAPER: This resource highlights the most commonly used authentication methods, and details the strengths and weaknesses of each to help you decide which solution is best for you.
Posted: 30 May 2014 | Published: 21 Mar 2014

SafeNet, Inc.

Case Study: Baltika Breweries Implements Safe File Exchange System
sponsored by GlobalScape
CASE STUDY: This case study follows Baltika Breweries' experience with a comprehensive file transfer platform that could accommodate their growing security requirements.
Posted: 30 May 2014 | Published: 27 May 2014

GlobalScape

Elliptic curve cryptography in transport ticketing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times.
Posted: 30 May 2014 | Published: 30 May 2014

ComputerWeekly.com

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett-Packard Company

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

2013 Magic Quadrant for Next-Generation Intrusion Prevention System
sponsored by Hewlett-Packard Limited
RESEARCH CONTENT: This informative guide explores some of the market's top intrusion prevention systems and outlines their important role in your enterprise.
Posted: 30 May 2014 | Published: 16 Dec 2013

Hewlett-Packard Limited

Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER: This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014

Infoblox

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett-Packard Company
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett-Packard Company

2013 Magic Quadrant for Application Security Testing
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 29 May 2014 | Published: 23 Jul 2013

Hewlett-Packard Limited

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

Designing a Secure DNS Architecture
sponsored by Infoblox
WHITE PAPER: This white paper offers essential tips to building a high-performance, secure domain name system (DNS) server to promote business growth.
Posted: 28 May 2014 | Published: 30 Apr 2014

Infoblox

2013 Cyber Risk Report Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.
Posted: 28 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 28 May 2014 | Premiered: Oct 23, 2013

Hexis Cyber Solutions Inc

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Code Signing: Leveraging HSMs to Safeguard Trust and Protect Your Business
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains how code signing works and why you need to add it to your online distribution security strategy.
Posted: 28 May 2014 | Published: 04 Feb 2014

SafeNet, Inc.

Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Transforming Information Security: Focusing on Strategic Technologies
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Posted: 29 May 2014 | Published: 29 May 2014

RSA, The Security Division of EMC
226 - 250 of 2560 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement