IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
76 - 100 of 2841 Matches Previous Page  |  Next Page
Mobile Security In Action: How Enterprises Are Getting Ahead of Threats
sponsored by vmware airwatch
WEBCAST: Enterprises need to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility. Learn how Samsung is protecting its mobile employees, best practices for your own mobile security strategy, and more.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Securely Enabling A Hybrid Cloud in Microsoft Azure
sponsored by Palo Alto Networks
WHITE PAPER: This white paper offers information on a cloud solution that allows you to securely enable a hybrid cloud by incorporating security concepts that includes segmentation policies, much like the prevention techniques used on your physical network.
Posted: 16 Dec 2016 | Published: 01 Nov 2016

Palo Alto Networks

5 Tips to Securely Enable File Sharing and Mobile Productivity
sponsored by BlackBerry
WHITE PAPER: Discover five ways to securely enable fire sharing and mobile productivity. You'll learn how to maximize productivity through easy document sharing and protect those documents on and off device.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

BlackBerry

A Repeatable Cloud-First Deployment Process Model
sponsored by Palo Alto Networks
WHITE PAPER: This informative paper offers guidance to help your organization establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies you may experience.
Posted: 16 Dec 2016 | Published: 01 Nov 2016

Palo Alto Networks

Mobile Security Addressing the Evolving Threat Landscape
sponsored by SOTI Inc.
WHITE PAPER: Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

SOTI Inc.

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Computer Weekly: Data Danger
sponsored by ComputerWeekly.com
EZINE: In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
Posted: 16 Dec 2016 | Published: 14 Dec 2016

ComputerWeekly.com

The 5 Next Big Things in Mobile Security
sponsored by vmware airwatch
WHITE PAPER: Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. This whitepaper covers the five next big trends in mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

How to Identity Web Threats in Real-Time
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

The Suspicious Seven: A Network Visibility Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

Cisco Systems, Inc.

Secure Enterprise File Sharing and Mobile Content Management
sponsored by BlackBerry
WHITE PAPER: Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

BlackBerry

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

Secure Email Against Targeted Phishing Attacks
sponsored by Blue Coat Systems
WHITE PAPER: To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Accelerating Your Incident Response & Improving Your Network Forensics
sponsored by Blue Coat Systems
WHITE PAPER: Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.

The Rise of Fileless Malware Attacks
sponsored by Fortinet, Inc.
EGUIDE: This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
76 - 100 of 2841 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement