IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
276 - 300 of 2376 Matches Previous Page  | Next Page
Protecting Your Mid-Size Business from Today's Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Hewlett-Packard Company

Managing Non-Microsoft Updates
sponsored by Secunia
WHITE PAPER: This guide focuses on the importance of security patches and how you can easily update your configuration from one centralized location.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

Secunia

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

Investigating Cloud and Mobile Options for Procurement
sponsored by SearchManufacturingERP
EBOOK: This handbook provides an expert roadmap for approaching cloud and mobile procurement, outlining common threats and challenges, tips for achieving e-procurement software ROI, and more.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

SearchManufacturingERP

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 17 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

IT Security: Midsize Businesses Face Enterprise- Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: As cybercriminals are carrying out sophisticated, enterprise-grade attacks on midsize businesses, ensuring system security within those smaller firms is more important than ever. This brief whitepaper explores the flaws in many midmarket organizations' IT security and why they are being targeted.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

A New Vision for Management of Fraud and Improper Payments
sponsored by Verizon
WHITE PAPER: This white paper explores the negative impact fraud has on healthcare benefits programs. Read on to learn 5 fraud management best practices and to discover a comprehensive SaaS platform that offers real-time security assessment.
Posted: 17 Mar 2014 | Published: 31 Oct 2011

Verizon

A Guide to Data Privacy in the Cloud
sponsored by Peak 10
WHITE PAPER: This exclusive whitepaper features tips for keeping your private data safe in the cloud.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Peak 10

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Protection For Every Enterprise, How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

What is Data Governance?
sponsored by Rand Secure Data
WHITE PAPER: This resource takes an inside look at data governance and describes the role of archiving, backup, and eDiscovery in an effective data governance strategy.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Rand Secure Data

VMIX: Neustar UltraDNS Case Study
sponsored by Neustar®
WHITE PAPER: This exclusive case study examines how an online video communications company was able to take advantage of a flexible managed DNS service in order to securely increase speed to market and expand globally.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Neustar®

The Evolution of the Enterprise…And Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Cybersecurity Imperitives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Compliance & Security in the Cloud
sponsored by Peak 10
WHITE PAPER: This helpful guide will take you through the process of picking a cloud service provider that will help you meet compliance and security regulations.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Peak 10

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

A New Approach to Combat Healthcare Fraud
sponsored by Verizon
WHITE PAPER: This informative resource discusses a fraud management service solution that processes healthcare claims transaction data quickly and efficiently, applying domain-specific predictive models, artificial intelligence algorithms and risk scoring to identify and prioritize abnormal patterns indicative of healthcare fraud.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Verizon

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

What’s the Best Focus for MDM Strategy Now?
sponsored by SearchSecurity.com
EBOOK: This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

SearchSecurity.com

Breaking Through the GRC Value Ceiling
sponsored by EMC Corporation
WHITE PAPER: This paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
Posted: 14 Mar 2014 | Published: 30 Sep 2013

EMC Corporation
276 - 300 of 2376 Matches Previous Page    10 11 12 13 14 15    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement