IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
226 - 250 of 2718 Matches Previous Page  | Next Page
Separating Work and Personal at the Platform Level: How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines a tool that separates work data from personal data on mobile devices so that you can provide the best security without sacrificing the user experience.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

BlackBerry

Why Your Company Should Consider Professional Security Services
sponsored by CDW Corporation
WHITE PAPER: This white paper details the professional security services offered by CDW, which include the people, partners, and planning capabilities to assist your organization in devising a comprehensive security strategy.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

CDW Corporation

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Gaining Control of the Cloud
sponsored by Gravitant
WHITE PAPER: This whitepaper covers how you can identify risks in the public cloud and offers a software solution to help keep you safe.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Gravitant

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Auditing Security Checklist for Use of AWS
sponsored by Amazon Web Services and Intel
WHITE PAPER: This paper is designed to help internal compliance teams and their external auditors with a checklist for assessing an organization's AWS security strategy.
Posted: 11 Jul 2014 | Published: 30 Jun 2014

Amazon Web Services and Intel

How Web Application and Next Generation Firewalls Stack Up Against OWASP Threats
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls--web application firewalls and next generation firewalls--measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP) threats.
Posted: 11 Jul 2014 | Published: 31 Dec 2013

Imperva

Imprivata Cortext: Secure Communications Platform for Healthcare
sponsored by Imprivata
WHITE PAPER: This IDC Health Insights white paper, sponsored by Imprivata, presents key findings of interviews with three healthcare IT executives at Atlantic Health System, Carolinas Pathology Group, and Beaufort Memorial Hospital regarding the deployment of Imprivata Cortext, a secure communications platform.
Posted: 11 Jul 2014 | Published: 31 May 2014

Imprivata

Best Practices for Selling Best-of-Breed Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services and Intel
WHITE PAPER: Consult this exclusive report to get a complete overview of security processes on AWS. Specifically, AWS physical and operational security processes are described for network and server infrastructure under AWS's management, as well as service-specific security implementations.
Posted: 10 Jul 2014 | Published: 30 Jun 2014

Amazon Web Services and Intel

ACOs justify telemedicine investment
sponsored by SearchHealthIT.com
EZINE: ACOs are making significant telemedicine investments for the savings virtual visits to patients can bring. This issue of Pulse delves into telemedicine, health analytics and more.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

SearchHealthIT.com

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Insight and Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Insight and Red Hat

Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

Establishing Trust in Online Identities
sponsored by HID
BROCHURE: Access this brochure to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

How to Quickly and Easily Configure Patch Management Policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: Learn how simple it is to configure patch management policies.
Posted: 09 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Top 5 "Must-Haves" for MSPs Adding IT Monitoring and Security Services
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper provides MSPs with guidelines for deciding which security solutions to offer and which suppliers to work with.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

AccelOps Inc.

Simple Security Is Better Security
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces an alternative solution to lower complexity—cloud-based endpoint security. Read on to find out how SMBs differ from one another and why it is important to take the time to evaluate each of their needs.
Posted: 09 Jul 2014 | Published: 31 May 2014

Sophos, Inc.
226 - 250 of 2718 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement