IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
26 - 50 of 2939 Matches Previous Page  |  Next Page
2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

A CISO Perspective: Why Unified Security Solutions are a Necessity
sponsored by Forcepoint
WEBCAST: Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017

Forcepoint

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers to your NGFW technology deployment success: integration with security workflow, total cost of ownership, and security effectiveness. But which one will work best for your distributed enterprises? In this webcast, learn key features to consider when selecting your technology, and discover insights on the testing process.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

How To Decrease Network Complexity & Help Your IT Staff
sponsored by Forcepoint
WHITE PAPER: According to Gartner, 80% of total IT costs occur after initial purchase. If you want to keep network security high and costs low, you need the right network management system. Inside, learn how you can decrease network complexity and help your IT staff do their jobs better and faster.
Posted: 17 Feb 2017 | Published: 14 Jan 2016

Forcepoint

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The Security Challenge or SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

Your Guide to Today's Corporate Web Security
sponsored by Forcepoint
WHITE PAPER: Gain insight into the corporate security market with this guide filled with detailed biographies of vendors, analytics of its changing landscape, and a structured way to evaluate any solution.
Posted: 17 Feb 2017 | Published: 31 May 2016

Forcepoint

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity
sponsored by IBM
CASE STUDY: The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Five Ways to Secure Mobile Data with EMM
sponsored by Appthority
EGUIDE: This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
Posted: 14 Feb 2017 | Published: 10 Feb 2017

Appthority

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

AVST
26 - 50 of 2939 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement