IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
76 - 100 of 2651 Matches Previous Page  |  Next Page
How to Prevent Security Breaches in Your Retail Network
sponsored by Dell Software
WHITE PAPER: This paper discusses the multi-vendor nature common to most high-profile security breaches in retail enterprises. Learn about several of the characteristics common to recent breaches, and uncover a blueprint for a viable security model to prevent breaches in retail networks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Why Threat Intelligence is Critical for Next Generation Firewalls
sponsored by Dell Software
WHITE PAPER: Read this paper and discover how a top-tier threat intelligence network makes the difference between an effective next-generation firewall and a mediocre one when it comes to defeating zero-day attacks and other advanced threats.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

A New Set of Network Security Challenges
sponsored by Dell Software
WHITE PAPER: Next-generation firewalls can help IT address the security and networking challenges of maintaining devices beyond the firewall without sacrificing employee productivity. Read the report and learn how these issues encompass network bandwidth, and learn how next generation firewalls promise IT a new way to solve this multisided puzzle.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Are Next-Gen Firewalls the Best Defense Against Cyber Attacks?
sponsored by Dell Software
WHITE PAPER: Discover how next-generation firewalls provide you with a robust, reliable defense against cyber attacks. Find out how you can protect your network and your business by applying the right security technology.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Prevent Insider Threats with UBA
sponsored by Exabeam
WHITE PAPER: Not all threats exist outside your organization. Insider threats could be potentially worse if they go undetected—leaking critical information. So how do you distinguish an insider attack, and more importantly, how do you stop them? Find out in the following exclusive white paper.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Exabeam

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc.
WHITE PAPER: Along with adapting to highly demanding and increasingly mobile customers, your institution needs to empower your employees to be productive and responsive. Find out how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 02 Jun 2016 | Published: 03 May 2016

Dell, Inc.

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

The Right Data Loss Prevention Products, Case by Case
sponsored by Intel Security
EGUIDE: This unbiased e-guide examines three data loss prevention (DLP) usage scenarios -- and the common issues associated with them -- to better help you make the right decision when purchasing DLP products. Explore subject matter from cybersecurity experts based on several companies' data classification policies.
Posted: 01 Jun 2016 | Published: 18 May 2016

Intel Security

Mobile First Healthcare
sponsored by MobileIron
WHITE PAPER: It isn't news that the healthcare industry has stringent privacy regulations. Don't let these regulations hold you back from taking adavantage of all that mobility has to offer. Read on to learn about a solution that provides mobile security so healthcare professionals can do their jobs without having to worry about privacy breaches.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: This white paper explores the effectiveness of real-time malware protection for financial institutions and banking customers. View now and see how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Exabeam

Communications Security: Key Issues and How to Succeed
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Review the common unified communications security issues and how you can counteract those issues and help your businesses safeguard IT assets, mitigate financial loss or legal exposure, and maintain high service levels when deploying real-time communications.
Posted: 26 May 2016 | Published: 30 Sep 2015

Oracle Corporation UK Ltd

Security Operations Centers: The Key to the Future
sponsored by Intel
RESOURCE CENTER: Security operations centers (SOCs) can help enterprises gain better visibility into their environments. In this resource, expert Eric Cole explains how to get the most out of SOCs.
Posted: 23 May 2016 | Published: 13 May 2016

Intel

Help Your Security Team Sleep at Night
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.
Posted: 23 May 2016 | Published: 23 May 2016

Riverbed Technology, Inc.

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Safeguard Protected Health Information
sponsored by Citrix
WHITE PAPER: Securing protected health information is a major priority for healthcare organizations and a major challenge since file sharing is such an important aspect of the industry. Learn about a secure file sharing solution that prevents information leaks while increasing productivity and collaboration.
Posted: 12 May 2016 | Published: 30 Jun 2015

Citrix

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
76 - 100 of 2651 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement