IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
301 - 325 of 3080 Matches Previous Page  |  Next Page
7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Rapid7

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

SANS Review: SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.
Posted: 02 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

7 Steps to Overcome SSL Security Issues and Vulnerabilities
sponsored by Fortinet, Inc.
EGUIDE: As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.
Posted: 02 Jun 2017 | Published: 25 May 2017

Fortinet, Inc.

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Key Considerations for Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 4 key considerations for securing privilege on the endpoint, how privilege is abused by malicious actors to cause breaches, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Top 5 Reasons to Prioritize Privileged Account Security Today
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 5 reasons to prioritize privileged account security in today's threat landscape.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Cybersecurity Dissonance: Security Gap Between Perception and Reality
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: To meet their security needs, many SMBs are working with a security operations center (SOC). Learn how a SOC can help meet your protection needs, and discover other key security info in this resource.
Posted: 01 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Cloud access security brokers: Hard to tell what's real
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, we look at the momentum behind cloud access security brokers and find out how the uses and dangers stack up.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

SearchSecurity.com

The Danger Within: Unmasking Insider Threats
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover the who, what, why and how of the insider threat to expose risks you may not be considering. Also uncover guidance to help you prevent and detect these costly attacks.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Securing the Enterprise's Cloud Assets on Amazon Web Services
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn how to get complete security for your AWS environment in this white paper.
Posted: 31 May 2017 | Published: 02 Jan 2017

CyberArk Software, Inc

Protection and Productivity: Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Explore the challenges surrounding the proper handling of privileged accounts to mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

From Spreadsheets To Software: The Intelligent Way To Manage Third-Party Risk
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Learn about forward-thinking systems that make third-party risk management a simpler and more efficient process.
Posted: 02 Jun 2017 | Published: 30 Dec 2016

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Develop Your Information Security Management System
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
RESEARCH CONTENT: This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.
Posted: 01 Jun 2017 | Published: 19 Jan 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks
301 - 325 of 3080 Matches Previous Page    11 12 13 14 15 16    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement