IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
26 - 50 of 2746 Matches Previous Page  |  Next Page
Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Aug 2015 | Published: 13 Nov 2014

Hewlett-Packard Company

Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

Solutions enhance compliant digital identity protection for healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Learn the key building blocks of a secure, compliant healthcare system, and how to solve security problems such as identity proofing, HIPAA and HITECH Act compliance, secure access to data, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

VASCO Data Security International

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Your Layered Security Defenses are Riddled with Holes… Here's what to do instead
sponsored by Malwarebytes Corporation
WEBCAST: In this webcast, security experts discuss the holes in the typical layered security approach and outline steps you can take to make your security program truly successful.
Posted: 19 Aug 2015 | Premiered: Jul 27, 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Securing the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper to learn how to successfully secure your enterprise in the cloud and see why this is important for customer retention.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Symantec Corporation

A guide to multi-layered web security
sponsored by Akamai
ESSENTIAL GUIDE: This essential guide details threats common to websites and web applications and what you can do to mitigate them. Read on to learn more.
Posted: 18 Aug 2015 | Published: 31 Dec 2014

Akamai

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Case Study: State Agency Bolsters Security & Operational Efficiencies
sponsored by Splunk
WHITE PAPER: This case study describes how the Nevada Department of Transportation enhanced its security and its efficiency with better log management.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

How to use threat intelligence with SIEM successfully
sponsored by AlienVault
EGUIDE: Access this expert e-guide to discover the secrets to a successful SIEM deployment. Also, learn the advantages of using threat intelligence with SIEM – including where threat intelligence data comes from.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

AlienVault

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

When Do Managed Security Services Makes Sense?
sponsored by Digital Guardian
WHITE PAPER: This resource discusses the benefits of investing in security services and helps you determine whether security services are the right choice for you.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Obtaining Network Information for Successful Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how advanced network monitoring technologies can help you detect even the subtlest attacks.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Secure Remote Data Collection for Better Data Use
sponsored by Splunk
WHITE PAPER: This white paper describes how a secure method of remote data collection can enable your enterprise to better analyze and leverage all the data in your network, not just the data generated in a central location.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

A Big Data Approach to Enterprise Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how big data can help you obtain a more advanced level of threat intelligence that can detect new forms of malware.
Posted: 17 Aug 2015 | Published: 31 Dec 2012

Splunk
26 - 50 of 2746 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement