IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
276 - 300 of 2651 Matches Previous Page  |  Next Page
A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 01 Feb 2015 | Published: 19 Aug 2014

Hewlett-Packard Company

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Reducing Security Risks from Open Source Software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores organizations' growing concerns over open source software. Read now to find out why open source should be on your radar, as well as the detrimental consequences and costs associated with it. Furthermore, you'll uncover 5 steps to obtaining peace of mind when it comes to open source software.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company

Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: This up-to-date study shows just how much the costs of cybercrime has been rising, and what your business stands to lose if it's breached today.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Why Do You Need Sandboxing for Protection?
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper reveals how sandboxing can help you combat advanced persistent threats.
Posted: 30 Jan 2015 | Published: 15 Jan 2014

Fortinet, Inc.

5 ½ Traits that make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper offers up five and half features that make a firewall next-generation.
Posted: 29 Jan 2015 | Published: 15 Dec 2014

Fortinet, Inc.

Printing Security: The ‘Forgotten Link’ in Operational Excellence
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper covers the top 10 rules for effective printer security.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited

Risk I/O Explainer Video
sponsored by Risk IO
WEBCAST: Download this exclusive video now to learn about a vulnerability management solution that will reveal your system vulnerabilities, identify those most at risk, show you exactly what you need to fix, and much more.
Posted: 26 Jan 2015 | Premiered: Jan 15, 2014

Risk IO

Protecting printer with Enterprise-Grade Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: Continue on to this important white paper now to learn about the risks of lax printing security and discover a printer security solution that can fill in any gaps in your façade.
Posted: 23 Jan 2015 | Published: 16 Dec 2014

Hewlett-Packard Limited

Top 5 Vulnerability Management Mistakes
sponsored by Risk IO
WEBCAST: Download this important webcast now to learn about the top five most common vulnerability management mistakes.
Posted: 23 Jan 2015 | Premiered: Jan 23, 2015

Risk IO

Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

Protect Your Printer, Protect Your Network
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this exclusive white paper now to learn about the dangers of unsecured printing and much more.
Posted: 22 Jan 2015 | Published: 16 Jan 2014

Hewlett-Packard Limited

Is Your Printing/Imaging Environment As Safe As the Rest of Your Infrastructure?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Security Practitioners Can Use Data to Make Intelligent Decisions that Minimize Risk
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores how an organization can utilize their data to make intelligent decisions that minimize your risk.
Posted: 20 Jan 2015 | Published: 02 Jan 2014

Risk IO

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
276 - 300 of 2651 Matches Previous Page    10 11 12 13 14 15    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement