IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
26 - 50 of 2996 Matches Previous Page  |  Next Page
Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explains how to overcome the complexity of security operations integration and enable high-speed communication between applications for the protection you need today.
Posted: 17 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

SANS Survey: Security and Accountability in the Cloud Data Center
sponsored by McAfee, Inc.
WHITE PAPER: How has cloud security changed this year? Has it improved? Stayed the same? Worsened? This report summarizes the second annual SANS survey of IT professionals using a variety of cloud providers and service models, including SaaS, IaaS, and PaaS implementations.
Posted: 17 Apr 2017 | Published: 30 Nov 2016

McAfee, Inc.

7 Factors Driving Proper Encryption Management
sponsored by WinMagic
RESOURCE: Learn 7 key factors in encryption management that are driving ingenuity, bolstering native encryption, unifying management and transforming security.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

WinMagic

Increase Password Security by Reducing Human Errors
sponsored by Specops Software
RESOURCE: Rethink what makes passwords strong. Discover what really makes a password virtually un-hackable, user-friendly, and how to implement a policy that reduces human error.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Specops Software

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

Privileged Account Management for Dummies
sponsored by Thycotic
WHITE PAPER: Uncover how privileged account management is more important to understand and protect today than ever before. This guide will help you to avoid catastrophic data breaches and possible massive monetary and reputational damage to your organization.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Thycotic

Intelligent Security Management Ends Costly Network Breaches
sponsored by FireMon
WHITE PAPER: In this white paper, learn more about the challenges network breaches present and what technology can provide you with the functionality to prevent them.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

FireMon

5 Steps to Quantifying Insider Risk
sponsored by Veriato, Inc.
WHITE PAPER: Security is a matter of numbers: vague alerts like "we are at risk" do little for the security professional tackling the issue at hand. Learn 4 "insider risk laws", 5 steps to quantifying and addressing insider risk, and more.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

Keep Hires From Starting Fires: Risk Mitigation
sponsored by Veriato, Inc.
WHITE PAPER: Discover some common sense suggestions for improving the "beginning of the life cycle" risk mitigation process and reducing the exposure of your organization to possible insider threats.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

GPDR: How the Data Privacy Revolution Can Work For You
sponsored by Veritas
WHITE PAPER: Learn how the GDPR will affect your organization. Discover how to take advantage of the opportunity by taking a holistic view of information governance and turn the huge amount of unstructured backup data into available and usable information assets.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veritas

Security Recommendations: How to Simplify, Not Weaken, Your Passwords
sponsored by Specops Software
RESOURCE: Discover side-by-side requirements for password efficacy from Microsoft, the NIST, and PCI, as well as tips and recommendations on further reading.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Specops Software

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

Your In-Depth Guide to GDPR
sponsored by Oracle Corporation UK Ltd
WEBCAST: Gain an overview of what the key objectives of GDPR are, what it means for your organization, and what impact it will have on your business.
Posted: 13 Apr 2017 | Premiered: Apr 11, 2017

Oracle Corporation UK Ltd

4 Steps to Reduce the Risk of Malicious Insider Activity
sponsored by Veriato, Inc.
WHITE PAPER: Learn 4 key steps in implementing a risk-based monitoring program, culminating in an ability to appropriately monitor user activity at every level, all while ensuring security and privacy are maintained.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Improving Efficiency and Effectiveness with a Security Incident Response Platform
sponsored by IBM
WHITE PAPER: Discover how the combination of a SIEM with an incident response platform will help your organization overcome cybersecurity and compliance issues and take a big step closer to being "cyber resilient".
Posted: 13 Apr 2017 | Published: 30 Nov 2016

IBM

Modernize Your Service Desk to Satisfy Today's Business User
sponsored by Cherwell
ANALYST REPORT: Business is being conducted at warp speed, and a new generation of "modern" users, expect business solutions to be as accessible, responsive and easy to use as the apps running on their mobile devices. Download this analyst report to discover how to modernize your service desk to satisfy today's business user.
Posted: 13 Apr 2017 | Published: 11 Jun 2015

Cherwell

Mitigate Insider Threats: User Activity & Behavior Monitoring Program
sponsored by Veriato, Inc.
WHITE PAPER: Learn how to best implement a user activity monitoring and/or user behavior analytics program to increase security against insider threats, drive productivity increases, and produce more efficient and effective employee investigations.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Vidant Health's New Threat Analytics Program: More Than The Sum of Its Parts
sponsored by McAfee, Inc.
WEBCAST: Inside this case study, learn how Vidant Health, the largest healthcare provider in North Carolina made delayed security reporting and conflicting APIs a thing of the past with their new threat analytics program.
Posted: 12 Apr 2017 | Premiered: Apr 12, 2017

McAfee, Inc.

Cybersecurity: The Rise of the Incident Response Platforms
sponsored by IBM
WHITE PAPER: In this ESG report learn how incident response platforms (IRPs) can solve many of the headaches plaguing IT and CISOs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

IBM

Why Your Organization Needs to be Cyber Resilent
sponsored by IBM
WHITE PAPER: 51% of companies believe that cyber resiliency is essential to achieving a strong security posture. Learn what it takes to be a cyber resilient organization, what barriers might be in your way, what threats you'll face, and more in this 2016 Ponemon study.
Posted: 12 Apr 2017 | Published: 30 Nov 2016

IBM

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.
26 - 50 of 2996 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement