IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
26 - 50 of 2666 Matches Previous Page  |  Next Page
Connecting the Dots: How Threat Intelligence Uses its Data
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper demonstrates how truly effective threat intelligence systems work by presenting a case study where a threat intelligence system was used to uncover the source of an attack.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Forrester Market Overview: Solutions for Cloud Security Management
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 16 Jul 2015 | Published: 02 Jun 2015

CloudPassage

Your Inside Look Into The Current EMM Market
sponsored by IBM
ANALYST REPORT: This research report provides insight into current EMM trends by reviewing the strengths and challenges of 18 major EMM providers.
Posted: 16 Jul 2015 | Published: 17 Sep 2014

IBM

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

The Benefits of Cloud-Based Authentication
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper describes the benefits of adopting a cloud-based authentication infrastructure.
Posted: 16 Jul 2015 | Published: 31 Jan 2012

Symantec Corporation

Top 10 API Security Considerations
sponsored by Axway
WHITE PAPER: This white paper explores the top 10 considerations for security architects looking to tackle one of today's biggest security challenges: APIs.
Posted: 16 Jul 2015 | Published: 16 Mar 2015

Axway

10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Identity and Access Management and Challenges
sponsored by HID
EGUIDE: Download and discover the essentials of identity and access management, and tips for tackling the five key challenges in managing identities and effective access control strategies.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

HID

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

You've Been Breached: Now What Do You Do?
sponsored by Dell SecureWorks
PODCAST: This podcast features tips on how to remedy a security breach before it can do lasting harm on your organization.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

Dell SecureWorks

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs
26 - 50 of 2666 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement