IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
176 - 200 of 1092 Matches Previous Page  |  Next Page
SOAR-Native SOC
sponsored by D3 Security
WHITE PAPER: If you already have some detection tools and ad hoc processes, and are transforming those elements into a formal SOC, now is an optimal time to learn how to leverage a SOAR platform's capabilities. In this white paper, explore the benefits of implementing a SOAR platform into your SOC.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

D3 Security

Observations from the Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

How Much Does it Cost to Build a 24x7 SOC?
sponsored by Expel
WHITE PAPER: To say SOCs are costly is an understatement—they can range anywhere from $10,000 to more than $10 million. Download this white paper to review 4 SOC options and costs associated with them, as well as what they can do for your organization.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Expel

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by Comforte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

Cyber Intrusion Services Casebook 2018
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CrowdStrike

Where to Invest Next to Mature Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

CrowdStrike

Enterprise Tokenization with SecurDPS
sponsored by Comforte AG
WHITE PAPER: Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

The SOAR Buyer's Guide
sponsored by Splunk
WHITE PAPER: Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Splunk

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

4 Reasons to Add UBA to Your SIEM
sponsored by Splunk
WHITE PAPER: To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

Anatomy of a Cloud-Native Data Breach
sponsored by Radware
WHITE PAPER: Learn about a real-world cloud data breach, how it could have been avoided, lessons learned from it, and how a cloud workload protection service could have helped.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Radware

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Securing Dynamic Networks
sponsored by BT
WHITE PAPER: Networks are changing as new 'internet native' applications and services drive demand for more bandwidth, performance and flexibility. This paper provides a summary of the key security considerations in the hybrid network landscape, as well as some suggestions as to how the challenges can be overcome.
Posted: 07 Mar 2019 | Published: 28 Feb 2019

BT

What is a Vulnerability Disclosure Policy and Why Do You Need One?
sponsored by HackerOne
WHITE PAPER: Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Falcon Complete - Instant Cybersecurity Maturity White Paper
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

The No BS Guide to Static Application Security Testing (SAST)
sponsored by WhiteHat Security
WHITE PAPER: Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

How to Secure your Code for GDPR Compliance
sponsored by WhiteHat Security
WHITE PAPER: To help bridge this gap, use this GDPR checklist for how to secure databases combined with best practices in AppSec from PCI DSS, and expand those ideas, checks, and balances into a full application checklist for developers.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security
176 - 200 of 1092 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info