IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 1038 Matches Previous Page  |  Next Page
5 Things You Need to Know about a Web Application Firewall
sponsored by Neustar
WHITE PAPER: Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer facing and mission critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know about a WAF.
Posted: 14 Feb 2019 | Published: 13 Apr 2018

TOPICS: 
Neustar

A Guide To Fraud In The Real World
sponsored by Splunk Services UK Ltd
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

TOPICS: 
Neustar

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell SecureWorks

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

3 Keys to Managing Vendor Risk in Financial Services
sponsored by ServiceNow
WHITE PAPER: With near-daily security breaches, every business should have risk management at the top of its to-do list. Many financial institutions don't recognize the need to look beyond their own systems. The solution to this is a vendor risk management process that allows organizations to prioritize each vendor based on the risk they pose to the business.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Complying with the General Data Protection Regulation (GDPR)
sponsored by ServiceNow
WHITE PAPER: One of GDPR's major goals is the protection of an individual's personal data and the definition of the rules for the free movement of personal data in the EU. In order to protect personal data, businesses must understand how they use data. In this white paper, learn about how to strengthen your data protection services to comply with GDPR.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
ServiceNow

Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Security Scorecard

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

The Complete Guide to Building Your Vendor Risk Management Program
sponsored by Security Scorecard
WHITE PAPER: Tackling the problem of vendor risk isn't made any easier by the fact that with technology solutions being added by the day, current vendor risk management (VRM) processes are not equipped to handle the growing demand of security risk assessments for new and existing third-parties. In this guide, learn how to improve your VRM program.
Posted: 08 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Security Scorecard

How Security Ratings Improve Risk Awareness While Delivering a Solid ROI
sponsored by Security Scorecard
WHITE PAPER: Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Security Scorecard

What to Look for in an MDR Provider
sponsored by Dell SecureWorks
WHITE PAPER: There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

9 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

Mitigate Security Risks and Embrace the Cloud: Voltage SecureData for Cloud
sponsored by Micro Focus
WHITE PAPER: In this white paper, learn how you can build security into the fabric of your organization so you can enjoy the benefits of the cloud while proactively protecting the interactions among your users, applications, and data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Micro Focus

2018 State of Security Operations:Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide
sponsored by Micro Focus
WHITE PAPER: Micro Focus Security Intelligence and Operations Consulting (SIOC) has assessed the capabilities and maturity of 144 discreet SOCs since 2008. In this 5th Annual State of Security Operations report, review insights into what makes some of the most advanced cyberdefense centers around the globe successful.
Posted: 07 Feb 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

How Blockchain Transforms Data Security
sponsored by ALTR
WHITE PAPER: The blockchain design pattern is not just about supporting digital currencies or rethinking every human system of trust. Its basic security-related characteristics have the potential to stem today's overwhelming tide of data breaches. In this white paper, learn more about blockchain and how it can help your organization protect sensitive data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
ALTR

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Dell SecureWorks

The Business Case for Investing in a Security Ratings Platform
sponsored by Security Scorecard
WHITE PAPER: Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Security Scorecard

ALTR: Finally, a Killer Application of Blockchain
sponsored by ALTR
WHITE PAPER: A perfect storm of data breaches and regulations entered everyone's lives within just one year. The Yahoo! and Equifax data breaches have become the largest in history. GDPR is in full effect, while privacy laws emerge from California and China. This analyst report evaluates ALTR, a startup that offers the ability to safeguard data via blockchain.
Posted: 06 Feb 2019 | Published: 20 Jun 2018

TOPICS: 
ALTR

Market Guide for Data Masking
sponsored by Micro Focus
WHITE PAPER: Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.
Posted: 06 Feb 2019 | Published: 20 Jul 2018

TOPICS: 
Micro Focus

DIY is DOA: Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Dell SecureWorks

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Forcepoint

Securing Innovation
sponsored by Micro Focus
WHITE PAPER: Businesses must adopt new technologies, innovate with new products, and find new partners to expand their business. But, all of these activities increase security risk. If these risks are not addressed, they can cause damage to the company. In this white paper, learn how Micro Focus security tools can help secure your data.
Posted: 05 Feb 2019 | Published: 31 Jul 2018

TOPICS: 
Micro Focus
1 - 25 of 1038 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement