IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
26 - 50 of 2712 Matches Previous Page  | Next Page
Enhancing the Customer Experience and Securing Endpoints with Biometrics
sponsored by NEC Corporation of America
TRANSCRIPT: This resource introduces NEC Corporation's NeoFace suite, a set of highly accurate facial recognition tools that use advanced facial processing and matching algorithms, and describes the business applications of biometrics.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

NEC Corporation of America

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

The Cyber Resilience Blueprint: A New Perspective on Security
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

Shavlik Protect: Everything You Need to Patch the OS, VMware and Third-Party Applications
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patching solution that can keep every Windows machine in your organization current with the latest software.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

Simplified Third-Party Patching for Microsoft System Center with Shavlik
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores a solution that expands Microsoft System Center Configuration Manager's patching capabilities to cover third-party applications.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Shavlik Technologies

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

How to Eliminate Known Vulnerabilities with Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This exclusive IT download will let you try out a patch management solution that adds non-Microsoft third-party patch to Microsoft System Center Configuration Manager to maximize your investment in System Center and to reduce risks from unpatched third-party applications.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Free Demo: Powerful and Easy-to-Use Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This complimentary IT download provides a hands-on demonstration of one solution that can patch desktops, data centers, virtual infrastructure and more.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014


NEC Biometrics Solutions Podcast: Enhancing the customer experience and securing endpoints
sponsored by NEC Corporation of America
PODCAST: This podcast reveals a biometrics solution that will help identify fraud across various industries. NEC's NeoFace uses a highly accurate, fast and flexible facial recognition tool for authentication purposes.
Posted: 10 Oct 2014 | Premiered: Oct 2, 2014

NEC Corporation of America

An Incident Response Playbook: From Monitoring to Operations
sponsored by AlienVault
WEBCAST: This exclusive webcast examines how to improve incident detection and response capabilities to match the vast array of cyber-attacks that exist today.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

Take The Worry Out Of Patch Management: Shavlik Protect
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores the importance of broadening patch management beyond just focusing on your operating systems.
Posted: 10 Oct 2014 | Premiered: May 7, 2014

Shavlik Technologies

Vulnerability Management: What you Need to Know to Prioritize Risk
sponsored by AlienVault
WEBCAST: This exclusive webcast covers the importance of prioritizing your vulnerabilities.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

How Resellers can become the Trusted Advisors
sponsored by Webroot
WHITE PAPER: While the specific issues Value Added Resellers face vary widely, there is one universal challenge that every reseller has to undertake—positioning itself as a trusted advisor to its customers. So in short, how do you do it? Read the following white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

IT and Enterprise Mobility: IT Is Fully Charged and Ready to Roam
sponsored by CA Technologies.
WHITE PAPER: Do you know how your mobility strategy stacks up against other organizations? This report reveals findings from a Vanson Bourne survey on IT and enterprise mobility.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

CA Technologies.

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

How to Detect System Compromise and Data Exfiltration
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how cyber criminals target your vulnerabilities and offers a demo of a unified security management platform to help you combat these attacks.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Securely Deliver New Business Services
sponsored by CA Technologies.
WHITE PAPER: This whitepaper examines the critical factors organizations must consider when it comes to meeting the balance between improving end-user engagement and maintaining proper security, focusing on the importance of strong identity and access management.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.
26 - 50 of 2712 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement