IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
201 - 225 of 1076 Matches Previous Page  |  Next Page
Best Practices for Office 365 Security Monitoring
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about tools and techniques that will help you secure and monitor your Office 365 environment.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

AT&T Cybersecurity

Best Practices for Data Protection and Security in the Couchbase Data Platform
sponsored by Couchbase
WHITE PAPER: Download this white paper to explore 3 security drivers in depth and find out how a data platform can provide end-to-end security control from the "core" (data center or cloud) to the "edge" (mobile device or embedded system).
Posted: 03 Oct 2018 | Published: 03 Oct 2018

Couchbase

Closing the IT Security Gap with Automation & AI in the Era of IoT: Global
sponsored by Somerville
WHITE PAPER: In the era of IOT, security gaps are on the rise. This Ponemon Institute's latest research report reveals how automation and AI are being put into play to secure these gaps and prevent breaches.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Somerville

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Cybersecurity Essentials Every Law Firm Needs
sponsored by Arctic Wolf
WHITE PAPER: Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

SOC-as-a-Service for Cloud Infrastructures and SaaS Applications
sponsored by Arctic Wolf
WHITE PAPER: Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Arctic Wolf

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Practitioner's Guide to Building a Security Operations Center (SOC)
sponsored by AT&T Cybersecurity
WHITE PAPER: Explore this white paper that examines the tools, personnel and processes required to build and operate an effective SOC, along with an analysis of how organizations can leverage the AlienVault Unified Security Management (USM) platform as the foundation for a SOC.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

AT&T Cybersecurity

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies

Combating the Top Five Cyberattacks with Managed Detection and Response
sponsored by Arctic Wolf
WHITE PAPER: This white paper walks through the top 5 security attacks, by providing insights into tactics, techniques and procedures commonly used by threat actors. Then, find out how a managed detection and response strategy can take your security protocols to the next level and protect your organization.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Arctic Wolf

The Essential Guide to Security: How You Can Solve Security Challenges
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 31 May 2018 | Published: 31 May 2018

Splunk

How C-Suite Leaders Win By Understanding the Role of the CISO
sponsored by Dell SecureWorks
WHITE PAPER: This white paper details the role of the CISO, taking an in-depth look at how CISOs can strike the right balance between organizational strategy and risk management.
Posted: 27 Apr 2018 | Published: 31 Dec 2017

Dell SecureWorks

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Buyers Guide: Network Security Management
sponsored by Palo Alto Networks
WHITE PAPER: When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks
201 - 225 of 1076 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info