IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 980 Matches Previous Page  |  Next Page
Credential Stuffing 2021: The Latest Attack Trends and Tools
sponsored by F5 Networks
WHITE PAPER: From the stereotypical loner in the basement to organized criminal gangs and nation states, attackers have become increasingly sophisticated over the past decade. So, how can security and fraud teams stay ahead? The key lies in using automation, machine learning and AI to create a security deterrent. Download this white paper to learn more.
Posted: 18 Oct 2021 | Published: 15 Oct 2021

F5 Networks

Counter Ransomware Attacks with Cohesity
sponsored by Cohesity and Wipro
WHITE PAPER: It’s important to be able to counter the ransomware threat by eliminating the risk of expensive downtime. Read on to learn how Cohesity uses machine learning technologies to help you protect your backup data with immutable file protection and multifactor authentication, detect intruders, and accelerate recovery times.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Cohesity and Wipro

The Enterprise Technology Orchestration Guide To Infosec
sponsored by Oomnitza
WHITE PAPER: The security aspect of IT asset management (ITAM) cannot be understated. Especially today – when resources are spread out and harder to keep an eye on. Technology orchestration gives your enterprise the opportunity to let IT take care of itself, tightening security and simplifying management. View this white paper to learn more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

Oomnitza

The 10 Essential Capabilities Of A Best-of-breed Soar
sponsored by Splunk
WHITE PAPER: Security analysts face high alert volumes, an overload of point-products to manage and a shortage of skilled talent. Security orchestration, automation and response (SOAR) tools have served as remedies, but not all of these tools are created equal. In this white paper, Splunk outlines 10 capabilities to look for when evaluating SOAR technology.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Splunk

HOW TO DESIGN YOUR SECURITY OPERATIONS CENTER (SOC)TO WORK SMARTER, NOT HARDER
sponsored by Splunk
WHITE PAPER: At the moment, security teams are dealing with limited resources and talent to stop unrelenting, advancing threats. This presents challenges for security operations centers (SOCs), but through more proactive security methods, these challenges can be alleviated. Read this white paper to learn how to design your SOC to work smarter, not harder.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Splunk

FortiSOAR Empowers Security Operations to Accelerate Incident Response
sponsored by Fortinet, Inc.
WHITE PAPER: As enterprises build out their security operations centers (SOCs), they’re finding that their current security installs are more disparate than they thought, tasking them with increasing visibility. But security skills are in short supply. Download this white paper to learn how SOAR can empower your SOC and accelerate incident response.
Posted: 19 Mar 2021 | Published: 12 May 2020

Fortinet, Inc.

Security Complexity is Out of Control
sponsored by Fortinet, Inc.
WHITE PAPER: Cybersecurity teams are deploying more solutions – and are getting more data from them – but the resulting picture is not encouraging. Complexity in managing these disparate solutions is overwhelming many security teams that are already overstretched. Download this white paper to investigate 6 challenges caused by security complexity.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Fortinet, Inc.

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Cybersecurity Is Improving, But Is It Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Exploring The Cymulate Edge How Targeted Cyberattack Simulations Differ From Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

High-Velocity Cloud Security At Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

Architecting a Secure Business-Driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

THE TRUE COST OF A DDoS ATTACK
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

Overcoming The Legacy Vpn Dilemma Zero Trust Access With Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access tools enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling A Sase Approach To Private Application Access And Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

On The Radar: Axis Security Takes A Different Approach To Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security
1 - 25 of 980 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences