IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 1057 Matches Previous Page  |  Next Page
Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
WHITE PAPER: Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.
Posted: 18 Apr 2019 | Published: 17 Oct 2018

Mimecast

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart

PCI DSS as a Foundation
sponsored by comForte AG
WHITE PAPER: There are many risks to personal and cardholder data. However, the GDPR and PCI DSS provide a clear roadmap on how organizations can most effectively protect that data. In this white paper, learn how to take advantage of the overlap between GDPR and PCI DSS to improve your overall data security strategy.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: When it comes to data loss prevention (DLP), the important thing to realize is that it's the methodology and execution strategy of your vendor that governs your experience and results. In this white paper, find a 9 step process for implementing and executing a data protection strategy.
Posted: 12 Apr 2019 | Published: 31 Mar 2019

Forcepoint

Simplify And Automate Data Protection For VMware
sponsored by Dell EMC
WHITE PAPER: The increasing reliance on virtual machines is bringing challenges for data protection, as businesses find themselves utilizing public and private clouds while at the same time moving toward their own software-defined data centers. This white paper outlines a strategy for applying automation and orchestration to automatically protect workloads.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

Dell EMC

Faster Response With Crowdstrike and MITRE ATT&CK™
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

CrowdStrike

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

Ransomware Defenses Require Backup and a Comprehensive Security Strategy
sponsored by Micro Focus
WHITE PAPER: Organizations must take a comprehensive approach to ransomware that includes security controls to detect and stop ransomware from locking down files. In this IDC white paper, learn how a data-centric protection strategy can prevent costly data loss and business disruption caused by ransomware and other cyberattacks.
Posted: 10 Apr 2019 | Published: 31 Aug 2018

Micro Focus

GDPR: 5 Tips For Organizations To Remain Compliant
sponsored by ASG Technologies Group Inc
WHITE PAPER: A huge amount of time and resource was invested to become GDPR compliant in time for the May 2018 deadline. But, the work to remain GDPR compliant is far from over. It is becoming increasingly clear that GDPR wasn't a one-time investment. In this white paper, discover 5 tips to remain compliant in the future.
Posted: 10 Apr 2019 | Published: 10 Jan 2019

ASG Technologies Group Inc

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Tackle GDPR with a Powerful Compliance Process
sponsored by ASG Technologies Group Inc
WHITE PAPER: The key areas of GDPR will require your company to utilize data solutions that can map, manage, and govern information. In this white paper, learn how implementing data protection at the base of your data management framework can help your organization always be ready for an audit.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

ASG Technologies Group Inc

Data Privacy Regulations in Transition: Adopting a Repeatable Framework that Protects Customer Data
sponsored by ASG Technologies Group Inc
WHITE PAPER: As the volume of data generated by companies continues to surge, it's evident that companies need a more thorough and integrated approach to data privacy management to retain customer trust and comply with regulations. In this white paper, discover the benefits of applying an integrated approach to protecting customer data.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

ASG Technologies Group Inc

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

The Truths and Lies of IoT Security: Monitoring Connected Devices
sponsored by MASERGY
WHITE PAPER: As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

Security Orchestration and Automation Solutions
sponsored by Rapid7
WHITE PAPER: One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

Servers, Servers, Everywhere: How the Hybrid Cloud is a Game Changer for Security
sponsored by Trend Micro, Inc.
WHITE PAPER: While the hybrid cloud offers many benefits, it is important that existing architectures are maintained and secured. In this white paper, learn more about the dynamics of the hybrid cloud and the security challenges introduced at both the business and technical levels.
Posted: 05 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Pillars of Protection: A New View of Enterprise Security
sponsored by Oracle Corporation
WHITE PAPER: Organizations today need to be protected at every layer – in the data center and in the cloud. Read on to learn how you can defend your business with the 3 pillars of protection.
Posted: 04 Apr 2019 | Published: 31 Jul 2018

Oracle Corporation

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 04 Apr 2019 | Published: 31 Dec 2017

Oracle Corporation
1 - 25 of 1057 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement