IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
276 - 300 of 3011 Matches Previous Page  |  Next Page
The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Application Development Security Requires Forethought
sponsored by Synopsys
EGUIDE: In this e-guide learn not only how to stay ahead of the competition with a quick development cycle, but also how to ensure the final product stays safe and sound.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


The Connection between IoT and DDoS Attacks
sponsored by Arbor Networks
EGUIDE: In this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Arbor Networks

How to Fend Off Hackers with Frequent App Security Testing
sponsored by Synopsys
EGUIDE: In this expert guide, learn about the realities of the threat hackers pose to your business, as well as several ways that constant app security testing can help close up the gaps in which hackers could sneak in. Then, learn some of the challenges that implementing security testing could pose.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


Five Important Truths About Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper discover 5 steps to meeting digital workspace security objectives, and taking a people-centric approach to security that doesn't come at the cost of productivity or user experience.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

RES Software

How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE: In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

Delta Risk

The Three Essential Elements of Next-Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: With an overabundance of security solutions being touted as "next gen," how do you know what really is an innovative endpoint protection product? Discover an explanation of the essential elements of next-gen endpoint protection, a list of the top questions to ask potential vendors, and more.
Posted: 07 Oct 2016 | Published: 07 Oct 2016

CrowdStrike

10 Reasons You Should Consider a Career in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: If you're already in the IT field, shifting gears to focus on cybersecurity is not as much of a transition as you might first think. This white paper highlights 10 key reasons you should consider a career in cybersecurity.
Posted: 07 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

3 Steps to Secure Cloud Database-as-a-Service
sponsored by Oracle Corporation UK Ltd
EGUIDE: Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
Posted: 06 Oct 2016 | Published: 04 Oct 2016

Oracle Corporation UK Ltd

Cybersecurity During a Merger: CrowdStrike on Key Risks and Due Diligence
sponsored by CrowdStrike
WHITE PAPER: In this interview with CrowdStrike's Steve Chabinsky, learn key risk factors such as cybersecurity that organizations encounter during the merger and acquisition due diligence process and how to avoid them.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

ThreatConnect

The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

CrowdStrike

Why So Many Enterprises Lack Proper Authentication Methods
sponsored by RSA Softcat
EGUIDE: Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

Appthority

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

How to Mitigate Shadow Cloud Services Security Risks
sponsored by IBM
EGUIDE: Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

How To Build An Enterprise Application Security Program
sponsored by Symantec + Blue Coat
EGUIDE: Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Neustar

No Downtime, No Problem. Silverstring Protects Customers and Their Data
sponsored by Neustar
WHITE PAPER: Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.
Posted: 10 Oct 2016 | Published: 30 Sep 2016

Neustar

Security Audit Planning and Preparation: Engage Early and Often
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software
276 - 300 of 3011 Matches Previous Page    10 11 12 13 14 15    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement