IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
76 - 100 of 2572 Matches Previous Page  | Next Page
Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

Establishing Trust in Online Identities
sponsored by HID
WHITE PAPER: Access this white paper to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

How to Quickly and Easily Configure Patch Management Policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: Learn how simple it is to configure patch management policies.
Posted: 09 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Top 5 "Must-Haves" for MSPs Adding IT Monitoring and Security Services
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper provides MSPs with guidelines for deciding which security solutions to offer and which suppliers to work with.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

AccelOps Inc.

Simple Security Is Better Security
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces an alternative solution to lower complexity—cloud-based endpoint security. Read on to find out how SMBs differ from one another and why it is important to take the time to evaluate each of their needs.
Posted: 09 Jul 2014 | Published: 31 May 2014

Sophos, Inc.

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

Appropriate Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: This informative whitepaper explores the appropriate security controls for your third party services and software.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Veracode, Inc.

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 08 Jul 2014 | Published: 18 Apr 2014

Sophos, Inc.

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

FTP VS MFT Why it’s time to make the change
sponsored by IBM
WHITE PAPER: Access this white paper to discover a managed file transfer (MFT) solution that has the power to upgrade, replace, consolidate or outsource your FTP processes.
Posted: 07 Jul 2014 | Published: 07 Jul 2012

IBM

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

Choosing the Right Virtual Server Backup Software for SMEs
sponsored by CA ARCserve
WHITE PAPER: Access this white paper to learn about a leading backup software solution that protects both physical and virtual environments.
Posted: 07 Jul 2014 | Published: 31 Mar 2014

CA ARCserve

GFI CloudTM Case Study - Central Bank & Trust
sponsored by GFI Cloud
CASE STUDY: This case study examines a cloud solution that has improved network security for a banking organization.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

3-Phase Clinical Content Archive Strategy
sponsored by Perceptive Software
WHITE PAPER: This white paper explains how the "Walk-Run-Fly" strategy can help healthcare organizations use VNA to effectively manage content.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Perceptive Software

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

SMS Two-Factor Authentication Options
sponsored by StrikeIron
EGUIDE: In this e-guide, discover the new two-factor authentication options that involve SMS text messages.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

StrikeIron

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation
76 - 100 of 2572 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement