IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 1092 Matches Previous Page  |  Next Page
Data Security for the Way People Work
sponsored by Dell EMC and Microsoft
WHITE PAPER: Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Dell EMC and Microsoft

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

How to Up Level your Defenses with Security Analytics
sponsored by Splunk
WHITE PAPER: If you don't have actionable insights to detect and respond to emerging and current threats, you're not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

The IT Director's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 14 Aug 2019 | Published: 31 May 2019

Ping Identity Corporation

The SIEM's Buyers Guide for 2020
sponsored by Splunk
WHITE PAPER: In short, a SIEM is a security platform that ingests event logs and offers a single view of this data with additional insights—but as with all growing tech offerings right now, its current capabilities may be far more than you are aware. Read this white paper to learn about the evolution of SIEM, and 9 technical capabilities of a modern SIEM.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Splunk

Fortinet SD-Branch Secures the Network Edge at the Branch
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Fortinet Private Cloud Security Solutions: Use Cases for Comprehensive Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations that invest in hybrid cloud infrastructures often realize significant business value, however; private clouds bring their own unique security challenges. In this white paper, explore 5 key uses cases for private cloud security and discover the benefits of Fortinet's private cloud security solution.
Posted: 13 Aug 2019 | Published: 02 Apr 2019

Fortinet, Inc.

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

5 Steps: How to Defend Your Company Against a Security Breach
sponsored by Micro Focus
WHITE PAPER: In this white paper, discover the 5 steps on how to defend your company against a security breach with the NIST framework.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Micro Focus

PeopleSoft Single Sign-On
sponsored by Appsian
WHITE PAPER: Explore how Appsian's Peoplesoft SSO Connecter can help your organization ensure its PeopleSoft applications work seamlessly within your enterprise environment. Learn about the challenges of off-the-shelf SSO software, and discover how Appsian's PeopleSoft SSO Connecter can help your organization improve security, boost productivity, and more.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Appsian

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Rethinking Data Security with a Risk-adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 06 Aug 2019 | Published: 30 Apr 2019

Forcepoint

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

How to Start Building an Industrial Cybersecurity Program
sponsored by Dragos
WHITE PAPER: In this white paper, discover how to start building an industrial cybersecurity program and what organizations beginning to develop an ICS security program should do.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Top 10 Security Trends for 2019
sponsored by Micro Focus & DXC Technology
WHITE PAPER: In this white paper, learn about the top 10 security trends in 2019 & the driving factors behind them.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Micro Focus & DXC Technology
1 - 25 of 1092 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement