IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
251 - 275 of 2362 Matches Previous Page  | Next Page
Key Business Differentiators Enabled by the Private Cloud
sponsored by IBM
WHITE PAPER: This paper looks at these and other private cloud differentiators, examining what they mean for the business and how best to incorporate them into your environment, based on the latest research, technologies and solutions.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

IBM

NSS Labs:  2013 Next Generation Firewall Security Value Map
sponsored by Fortinet, Inc.
WHITE PAPER: This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Building momentum: Symantec's new approach to security
sponsored by TechTarget
RESOURCE: Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores the role of recovery in data backup and security, and introduces a backup tool that delivers the key capabilities you need.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Joffe & Kindervag Explain DDoS Mitigation
sponsored by Neustar®
WEBCAST: This crucial webcast takes an in-depth look at DDoS attacks, discussing how they became such a global threat and what your organization can do to mitigate them.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Secure DNS Prevents DDoS Attacks
sponsored by Neustar®
WEBCAST: This informative webcast discusses why DNS has become a favorite target for DDoS attacks and how a hardened DNS combined with cloud-based protection can provide the shield your organization needs.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Healthcare Fraud Management: Solutions for Identification and Intervention
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that leverages predictive analytics to identify potentially fraudulent claims and prevent improper payment before they occur.
Posted: 18 Mar 2014 | Published: 30 Nov 2011

Verizon

Protecting Your Mid-Size Business from Today's Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Hewlett-Packard Company

Managing Non-Microsoft Updates
sponsored by Secunia
WHITE PAPER: This guide focuses on the importance of security patches and how you can easily update your configuration from one centralized location.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

Secunia

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

Investigating Cloud and Mobile Options for Procurement
sponsored by SearchManufacturingERP
EBOOK: This handbook provides an expert roadmap for approaching cloud and mobile procurement, outlining common threats and challenges, tips for achieving e-procurement software ROI, and more.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

SearchManufacturingERP

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 17 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

IT Security: Midsize Businesses Face Enterprise- Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: As cybercriminals are carrying out sophisticated, enterprise-grade attacks on midsize businesses, ensuring system security within those smaller firms is more important than ever. This brief whitepaper explores the flaws in many midmarket organizations' IT security and why they are being targeted.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

A New Vision for Management of Fraud and Improper Payments
sponsored by Verizon
WHITE PAPER: This white paper explores the negative impact fraud has on healthcare benefits programs. Read on to learn 5 fraud management best practices and to discover a comprehensive SaaS platform that offers real-time security assessment.
Posted: 17 Mar 2014 | Published: 31 Oct 2011

Verizon

A Guide to Data Privacy in the Cloud
sponsored by Peak 10
WHITE PAPER: This exclusive whitepaper features tips for keeping your private data safe in the cloud.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Peak 10
251 - 275 of 2362 Matches Previous Page    9 10 11 12 13 14    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement