IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
76 - 100 of 3060 Matches Previous Page  |  Next Page
Balancing Flexible Network Access with Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy a flexible and scalable policy, analytics, and reporting system to ensure the security of your network.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: The Wi-Fi Alliance predicts that the number of connected consumer and business devices will reach 38.5 billion in 2020. Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

How to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to confront the lack of faith many organizations have in their security policy, stay current with regulatory compliance, and keep pace with the evolving and expanding corporate infrastructure.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Rethinking the Approach To Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

How to Simplify Your GDPR Compliance
sponsored by Commvault
WHITE PAPER: Learn how PGNiG (the leader of the Polish natural gas market) has implemented a platform to deliver end-to-end data management, improved cost efficiency and access, while also reducing business risk.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Commvault

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about 5 key areas where security is commonly lacking and why they are important to shore up to protect your enterprise from today's threats.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy an advanced security approach to combat ransomware using next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017


How Hopkins Homes Ltd. Kept Their Network Clean Without Overreaching
sponsored by GFI
CASE STUDY: In this case study, learn how Hopkins Homes Ltd., a residential development company was able to implement an internet policy that keeps the network safe while allowing employees to police themselves.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

GFI

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 05 Jun 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden or GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

The Latest Strategies for New Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how you can improve your protection and visibility while reducing operating complexity to meet tomorrow's security needs.
Posted: 05 Jun 2017 | Published: 03 Apr 2017

Fortinet, Inc.

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Prevent Socially-Engineered Targeted Attacks: Vendor Spotlight
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how anti-spear phishing, anti-whaling, and specialized threat analysis and protection (STAP) features are the best techniques to prevent socially-engineered, targeted cyberattacks, as well as how to evaluate vendors, essential buyer guidance on a leading vendor, and more.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

The General Data Protection Regulation Will Change The Way You Do Business
sponsored by Mimecast
RESEARCH CONTENT: In this Forrester Report, learn about the 5 core General Data Protection Regulation (GDPR) requirements, as well as 2 related adjustments you need to make before this law goes into practice next May, and keep your organization from being hit with steep fines unnecessarily.
Posted: 05 Jun 2017 | Published: 14 Oct 2016

Mimecast

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.
76 - 100 of 3060 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement