IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
26 - 50 of 2765 Matches Previous Page  | Next Page
Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER: This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014

SafeNet, Inc.

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Analysis of the 4 Acceptable PCI DSS Storage Methods
sponsored by Delego
WHITE PAPER: Continue on to this important whitepaper now to explore the pros and cons of the four acceptable storage methods as outlined by the PCI DSS.
Posted: 12 Dec 2014 | Published: 12 Dec 2013

Delego

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How to Build and Maintain a Secure Network
sponsored by Delego
WHITE PAPER: Download this informative whitepaper now for 12 chapters on how to navigate the PCI-DSS and stay in compliance while protecting your customer's information.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Delego

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Vendor vs. Vendor: Security Information and Event Management Solutions
sponsored by IT Central Station
ESSENTIAL GUIDE: Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


The Self-Service Password Reset Checklist
sponsored by Tools4ever
WHITE PAPER: This white paper will help your organization to determine whether investing in a self-service password reset solution is worth it, providing a checklist of issues that your company may encounter along the way and a number of solutions to save you time and money.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WEBCAST: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Premiered: Nov 10, 2014

TaaSera

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

Oracle Identity Manager vs. Tivoli Identity Manager: IAMs fight for the win
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of identity and access management solutions out there, sometimes it can be hard to decipher fact from fiction when it comes to reading user reviews. Find out what verified IT experts say about IAM products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


Experts' Best Practices for Secure Remote Network Access
sponsored by ObserveIT
EGUIDE: This helpful guide compiles a number of expert tips on how to secure remote network access, including how to set up a secure home network; what to include in a remote access audit; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ObserveIT

Plan to Migrate before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, explore why it is crucial to begin your migration away from WS 2003 now and what your options are for an upgrade. View a pros and cons list of several server and OS avenues you can take. Read on to discover IT professional insights to assess which solution is right for your organization's workload and budget.
Posted: 05 Dec 2014 | Published: 05 Nov 2014

Hewlett-Packard Company
26 - 50 of 2765 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement