IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
26 - 50 of 2630 Matches Previous Page  |  Next Page
What to Consider When Formulating an Enterprise Mobile Security Strategy
sponsored by BlackBerry
EGUIDE: In this e-guide, Moriah Sargent explains why mobile device security policies should be revisited and revised often. In addition, Zeus Kerravala discusses essential enterprise security controls for the increasing amount of high-value information stored on mobile devices.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

BlackBerry

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

How Security Practitioners Can Use Data to Make Intelligent Decisions that Minimize Risk
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores how an organization can utilize their data to make intelligent decisions that minimize your risk.
Posted: 20 Jan 2015 | Published: 02 Jan 2014

Risk IO

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

If You're Still Running Windows Server 2003, You Failed
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide, explore strategies to overcome the common challenges and excuses of not migrating away from WS 2003. Read on to learn what security issues you will encounter after July 14, 2015 if you continue on the outdated server OS and why you need to migrate away immediately.
Posted: 19 Jan 2015 | Published: 14 Jan 2015

Cisco Systems, Inc.

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

A Holistic Approach to Data Privacy
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: This white paper makes a case for a holistic approach to privacy within every enterprise, and explains the steps that your enterprise needs to take in order to maximize the privacy of your sensitive data.
Posted: 16 Jan 2015 | Published: 30 Sep 2013

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Advanced Threat Hunting with Carbon Black
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download this exclusive white paper now to learn how you can improve your security posture by setting the foundational elements necessary to proactively hunt for and eliminate threats.
Posted: 16 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

Specialty Gift Retailer Keeps Point-of-Sale Devices— and Customers’Information—Secure with Bit9
sponsored by Bit9 + Carbon Black
CASE STUDY: This exclusive case study details the security platform one retailer chose to protect themselves from advanced threats.
Posted: 16 Jan 2015 | Published: 16 Dec 2014

Bit9 + Carbon Black

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

Why Are You Still Paying for Antivirus?
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download this important white paper now to find out more about advanced threat, prevention, detection, and response.
Posted: 15 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
BOOK: This eBook will teach you how to secure your POS systems, minimize your risk, achieve PCI DSS compliance, protect cardholder data, and more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Bit9 + Carbon Black

Breach Detection: What You Need to Know
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important e-book explores the tactics advanced attackers use to break into your organization and how a defense-in-depth cyber-security program with automatic detection and incident response can help you fight back.
Posted: 15 Jan 2015 | Published: 16 Jan 2014

Bit9 + Carbon Black

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: The exclusive e-book covers the changes to endpoint security you have to make in today's evolving threat landscape.
Posted: 15 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper lists 5 steps that your enterprise can take to guard your endpoints; reduce the complexity of assessments; lower administration costs; and achieve a compliant, secure environment.
Posted: 14 Jan 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Defense Contractor Resolves Breach, Saves Thousands in IR Costs with Carbon Black
sponsored by Bit9 + Carbon Black
CASE STUDY: This exclusive case study looks at the security solution one system administrator for a major defense contractor turned to with their job on the line.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black
26 - 50 of 2630 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement