IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 1176 Matches Previous Page  |  Next Page
Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER: Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Netskope

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, then chances are you’re exploring more flexible network access options, but you still want to keep your VPN. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

Customer Identity and Access Management – The Master Key for Digital Markets
sponsored by IC Consult
WHITE PAPER: In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

IC Consult

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

4 Key Tips from Incident Response Experts
sponsored by Sophos
WHITE PAPER: Today’s cyberthreats are unpredictable, so you need to make sure that you and your organization know what to do in the event of an incident. You also need to make sure you’re investing in the right technologies to detect and respond to threats. Reading these 4 tips will help you to know where you stand.
Posted: 11 Jan 2021 | Published: 09 Nov 2020

Sophos

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions
sponsored by Netskope
WHITE PAPER: Quite often, things don’t go as planned (as least as far as the big events in life go). For networking and security professionals, this was true of plans made in 2019 for 2020. All of 2019’s plans went out the window early on, and organizations had to adjust. So, what are experts saying about 2021? Download this article to find out.
Posted: 11 Jan 2021 | Published: 24 Nov 2020

Netskope

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

EDR: The Case for Automation & Simplification
sponsored by Kaspersky Lab
WHITE PAPER: For modern organizations looking to protect their growing population of endpoints, Endpoint Detection and Response (EDR) tools are a viable option. But what is EDR, what threats does it combat, and can it be automated? Read this whitepaper to find out.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Kaspersky Lab

SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats
sponsored by Netskope
WHITE PAPER: Amid digital transformation, an industry-wide focus on SASE and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. Read this in-depth blog to understand the forces of organizational culture, as well as adversaries and threats, on SASE initiatives.
Posted: 08 Jan 2021 | Published: 12 Nov 2020

Netskope

Helpful Answers to Your SASE-est Questions
sponsored by Netskope
WHITE PAPER: Businesses large and small are seeing the cost benefits of moving to a cloud-native control point, with the security posture and risk management tools they need. With that in mind, they still have questions and want clarity about SASE as a concept. In this article, peer through some of the most popular questions (and answers) about SASE.
Posted: 08 Jan 2021 | Published: 18 Dec 2020

Netskope

On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

SIA Product Page
sponsored by Citrix
WHITE PAPER: From transitioning to the cloud to managing an increasingly distributed workforce, it’s more important than ever to secure users, apps and data—without compromising the employee experience. Use this white paper to discover how Citrix Secure Internet Access can help you protect all users, in any location, for all applications via the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

The Third Question: What CISOs aren’t asking - and what’s at stake.
sponsored by Absolute Software Corporation
WHITE PAPER: The role CISO is the world’s most stressful balancing act between ensuring operational efficiency and protection against sinister cyberthreats. In this white paper, 4 of the world’s top cybersecurity innovators weigh in on the critical questions CISOs need to be – but often aren’t – asking themselves.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Absolute Software Corporation

A Unified Approach to SASE that Starts with the Digital Workspace
sponsored by Citrix
WHITE PAPER: IT departments have many challenges on their hands. They need to secure users from bad actors, and enterprise data from prying eyes, while said users are working from home or in-office, and they must provide flexible access to business and personal applications wherever they are. In this article, see how a unified approach to SASE can help.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company's reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization's preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 05 Jan 2021 | Published: 20 Jul 2020

Mimecast

Transforming the SOC
sponsored by Mimecast
WHITE PAPER: Each year, organizations explore new technological territories and hackers grow more complex. This is made more difficult by an ever-expanding cybersecurity skills gap. This resource captures the expertise of independent industry leaders dedicated to addressing this imbalance by helping organizations rethink security operations – download now.
Posted: 05 Jan 2021 | Published: 16 Jul 2020

Mimecast

Secure Internet Access: Comprehensive, Cloud-delivered Security for the Digital Workspace
sponsored by Citrix
WHITE PAPER: Increases in both hybrid cloud adoption and remote work mean that traditional connectivity models such as VPN and MPLS no longer provide ample performance and security. Enter Citrix Secure Internet Access, a SASE framework offering comprehensive security and reliable access to apps from any device. Download this solution brief for more details.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Citrix
1 - 25 of 1176 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info