IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
126 - 150 of 1132 Matches Previous Page  |  Next Page
Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Personnel Administration and Security Solution for Federal Agencies
sponsored by Appian
WHITE PAPER: In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.
Posted: 17 Jul 2019 | Published: 17 Jul 2019

Appian

Cybersecurity Trailblazers Make Security Intrinsic to Their Business
sponsored by VMware
WHITE PAPER: In this e-book, find suggestions for improving your enterprises' security posture, based on lessons learned from the cybersecurity trailblazers and executives interviewed for this report.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

VMware

3 Steps to Securing Enterprise Data on Cloud Platforms
sponsored by ReliaQuest
WHITE PAPER: Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The Four Pillars of Modern Vulnerability Management
sponsored by Rapid7
WHITE PAPER: In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Rapid7

Salesforce Data Protection Through User Activity Monitoring
sponsored by FairWarning
WHITE PAPER: Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

FairWarning

The Digital Workspace: 3 Elements of Success
sponsored by Citrix
WHITE PAPER: When it comes to managing the digital workspace, IT leaders overwhelmingly selected security as the top challenge. However, when managed properly, the right cloud-based digital workspace can keep organizations secure. In this white paper, learn how a unified Citrix experience can help organizations expand their security.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Citrix

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Citrix

3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

Threat Intelligence: Far-fetched Idea or Must-Have Security Tactic?
sponsored by Mimecast
WHITE PAPER: Whether you're a large enterprise or a lean one, threat intelligence is the responsibility of every CISO. Download this white paper to learn how you can make threat intelligence a priority in your cyber resilience planning today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Securing Applications by Default
sponsored by VMware
WHITE PAPER: As your business applications continue to advance, your security risk will grow at a similar pace leaving your business susceptible to more application attacks. Read this short four page whitepaper on how you can better secure your business applications as they grow moving forward.
Posted: 21 Jun 2019 | Published: 31 Dec 2018

VMware

Reduce your attack surface using Guardicore Centra Security Platform
sponsored by Guardicore
WHITE PAPER: Enterprise IT infrastructure is evolving to cloud and hybrid cloud architectures. Although this transformation is helping many organizations, it is also creating a larger security attack surface. In this data sheet, learn how Guardicore Centra Security Platform can help organizations apply micro-segmentation controls to reduce their attack surface.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

What are your Public Cloud Security Risks?
sponsored by Lacework
WHITE PAPER: There are many good business reasons why the public cloud has become a go-to environment for fast infrastructure expansion. But is it secure? Read on to learn about the cloud's unique security challenges and how continuous, real-time monitoring, analysis, and alerting can help your organization stay secure.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

4 Ways Digital Transformation Can Help the Bottom Line and How a SIEM Can Help
sponsored by Splunk
WHITE PAPER: There are many ways digital transformation can benefit a company. Download this white paper to explore four ways a SIEM solution can help.
Posted: 24 May 2019 | Published: 24 May 2019

Splunk

Now on Now: Accelerating Security Operations
sponsored by ServiceNow
WHITE PAPER: Most companies manage security incident response with a manual process. This creates confusion and reduces the visibility an organization has. In this white paper, learn how with the Security Incident Response application of ServiceNow Security Operations, organizations can automate alert processing and accelerate their incident response process.
Posted: 24 May 2019 | Published: 30 Jun 2018

ServiceNow

Cybersecurity in Financial Services: Orchestrating the Best Defense in an Evolving Threat Landscape
sponsored by ServiceNow
WHITE PAPER: Financial Services has been a targeted sector and cybercrime is becoming sophisticated on an industrial scale. A more strategic and wholesale approach needs to be adopted industry-wide to fend off the threat. In this white paper, learn how organizations can leverage technology to get a holistic view of their entire business.
Posted: 24 May 2019 | Published: 28 Feb 2019

ServiceNow

Containing Security Incident Response Costs
sponsored by enSilo
WHITE PAPER: Of the many challenges security leaders face, one big issue that can often be downplayed is budgeting. While the cost of a breach is well documented, the costs of managing a security team, that can prevent attacks, are not. In this white paper, learn how enSilo can help solve the problem of uncontained and unexpected incident response costs.
Posted: 23 May 2019 | Published: 05 Mar 2018


Security Maturity: Mapping the Road to Resilience in Europe
sponsored by Dell SecureWorks
WHITE PAPER: The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

Digital Transformation Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER: Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight
126 - 150 of 1132 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement