IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
301 - 325 of 2336 Matches Previous Page  | Next Page
Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com

Hot Knives Through Butter: Evading File-based Sandboxes
sponsored by FireEye
WHITE PAPER: This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

FireEye

Definitive Guide to Next Generation Threat Protection eBook
sponsored by FireEye
EBOOK: In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

Get a Jumpstart on Desktop Virtualization and Take Control of BYOD
sponsored by VMware
WEBCAST: This webcast details how to keep your data secure and take control of BYOD and virtual desktops.
Posted: 04 Mar 2014 | Premiered: Mar 4, 2014

VMware

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation
sponsored by AlienVault
WEBCAST: This in-depth webinar explores the current threat landscape, SQL injection and XSS attacks and what you can do to stop them.
Posted: 04 Mar 2014 | Premiered: Feb 25, 2014

AlienVault

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Transcript: Network Visibility: Thinking Outside the Box
sponsored by Ixia
PRESENTATION TRANSCRIPT: Explore how virtualization can challenge network monitoring, and discover a scalable solution that will help improve visibility for effective, scalable, secure network monitoring.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER: Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Information Security Magazine – March 2014
sponsored by SearchSecurity.com
EZINE: In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

SearchSecurity.com

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Podcast: Emerging Security Threats: Know Your Enemy in 2014
sponsored by Imperva
PODCAST: Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Johanne B. Ullrich, dean of research for the SANS Technology Institute, shows you how.
Posted: 03 Mar 2014 | Premiered: Feb 24, 2014

Imperva

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Mobilize Your Corporate Content and Intranet
sponsored by Fiberlink
WEBCAST: This exclusive webcast examines a mobile enterprise gateway solution that provides mobile access to collaborative business resources while securing your data with authorization, encryption, and containerization policies.
Posted: 03 Mar 2014 | Premiered: Mar 3, 2014

Fiberlink

Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014

Symantec Corporation

Five Common Web Application Vulnerabilities and How to Avoid Them
sponsored by Imperva
EGUIDE: In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Imperva

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

A Planner's Realistic Guide to Cloud Data Security
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide will walk you through the creation of a safe and secure cloud environment.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

Dell, Inc. and Intel®

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®
301 - 325 of 2336 Matches Previous Page    11 12 13 14 15 16    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement