IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
76 - 100 of 2667 Matches Previous Page  |  Next Page
The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014

Absolute Software

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Track and Analyze the Impact of Mobile Apps, Platforms and Device Preferences
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology

Intralinks® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014

Absolute Software

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 30 Apr 2015 | Published: 30 Nov 2013

Dell, Inc. & Intel®

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

The Importance of BYOD Security
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide highlights BYOD security strategies that can help organizations enable a truly secure BYOD environment, especially through the use of VPN and strong BYOD management policies.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

IT Security: Creating Heroes Instead of Headaches
sponsored by BitDefender
WHITE PAPER: In this white paper, discover insights on how you can transform your security system into one that not only protects your business, but propels it forward as well.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Balancing Security and Mobility with the Right MDM Solution
sponsored by IBM
WHITE PAPER: Access this white paper now and discover how you can embrace IT consumerization be adopting a mobile device management (MDM) system that can provide all of the security you need without sacrificing the benefits of mobility.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

Enterprise Mobility Management: Mobile Security Is Here To Stay
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide explores how enterprise mobility management should be used as a means to deliver a secure BYODs experience through the use of defined security policies, richer management suites and greater integration to enable secure mobility.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks
sponsored by Alcatel-Lucent
WHITE PAPER: Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Alcatel-Lucent

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Outsourcing Security Services: What You Need to Know
sponsored by Digital Guardian
EGUIDE: In this expert guide, discover tips for choosing the right security service provider, writing an SLA, and more.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Digital Guardian

The hidden costs of self-signed SSL certificates
sponsored by Symantec
WHITE PAPER: Read this white paper to discover a detailed breakdown of the real total cost of ownership of a self-sign SSL certificate.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Symantec

How Privileged Activity Monitoring Streamlines Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance.
Posted: 24 Apr 2015 | Published: 24 Feb 2014

BalaBit

Why Activity Monitoring Should Supplement Log Management
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how you can fill in your log management gaps by monitoring privileged users.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

Top 10 Reasons to Monitor Privileged Users
sponsored by BalaBit
WHITE PAPER: In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

Control Your IT Staff
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how privileged activity monitoring can easily collect data about what your privileged users are doing.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec
76 - 100 of 2667 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement