IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
51 - 75 of 2931 Matches Previous Page  |  Next Page
Streaming Malware Defense: High Speed Bridge-Based Antiā€Virus Gateway
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to implement better web security and web filtering strategies for both desktop and mobile devices. Discover how to keep up with high speed, bridge-based malware defense systems.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco

How a global medical manufacturer routs out ransomware
sponsored by Cisco
CASE STUDY: Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Learn To Build A Holistic Cybersecurity Program
sponsored by Presidio Networked Solutions
EGUIDE: In this expert-eguide, learn how you can take a proactive approach to protecting your information systems, and how to vet vendors before trusting them with your data.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Presidio Networked Solutions

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

BitSight

Understanding and Mitigating DNS DDoS Attacks
sponsored by Box
WHITE PAPER: A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. So what are your company's risks and how can you mitigate them?
Posted: 06 Feb 2017 | Published: 31 Dec 2015

Box

IAM on the Cloud: Avoiding Silos and Vulnerability
sponsored by Centrify in partnership with Microsoft
EGUIDE: Access this e-guide now to discover how to use Identity as a Service (IDaaS) to meet both operational and security objectives.
Posted: 03 Feb 2017 | Published: 30 Jan 2017

Centrify in partnership with Microsoft

Financial Technologies Protects its Network From Malware and Other Internet Threats
sponsored by ContentKeeper
WHITE PAPER: Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution
sponsored by ContentKeeper
WHITE PAPER: Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Vendor Analysis: 8 Cloud Security Gateway Providers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this Forrester report, discover a 23-criteria evaluation for cloud security gateway (CSG) providers that identifies, analyzes, and scores the top 8, allowing you to make an educated decision in choosing which one might be the best for your enterprise.
Posted: 03 Feb 2017 | Published: 15 Nov 2016

Symantec & Blue Coat Systems

Web Filtering and Security: Capital Area Intermediate Unit Case Study
sponsored by ContentKeeper
CASE STUDY: This case study explores how to implement a web filtering and security system that can inspect SSL encrypted web page requests and enable more granular control over website access. Discover how to unlock better insight into and control over the use of Web 2.0 tools and SSL encrypted sites.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

How to Strengthen Your Identity Infrastructure
sponsored by ExtraHop
WHITE PAPER: Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ExtraHop

7 Data Loss Prevention Suite Providers Compared
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.
Posted: 02 Feb 2017 | Published: 08 Nov 2016

Symantec & Blue Coat Systems

How to Get More Signal, Less Noise for Your SIEM
sponsored by ExtraHop
WHITE PAPER: Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ExtraHop

Confronting Enterprise Security Risk: The State of Incident Response
sponsored by ServiceNow
WHITE PAPER: In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

An Essential Checklist for Your Security Response Solution
sponsored by ServiceNow
WHITE PAPER: Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault

How to Tackle Endpoint Defense Issues
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 31 Jan 2017 | Published: 27 Jan 2017

Carbon Black
51 - 75 of 2931 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement