IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
51 - 75 of 1280 Matches Previous Page  |  Next Page
Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Sixgill Report - #NoFilter: Social Media Hacking From The Underground
sponsored by Sixgill
WHITE PAPER: Because everyone is locked indoors, consumer usage of social media platforms has increased dramatically. Now, there’s another epidemic in the form of inorganic social media engagement (likes, views, followers, etc.) that points to a much larger problem – underground social media hacking. Read this report to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Sixgill

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Onegini

Securing SMBs in a World of Digital Transformation
sponsored by Claranet
WHITE PAPER: The era of digital transformation demands similar growth in security capabilities as well. While large enterprises have the resources to invest heavily in this area, small and medium businesses (SMBs) must be a bit more resourceful. Read this white paper, which highlights cybersecurity guidance for SMBs in the era of digital transformation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Small Business Security: 4 Steps to Success
sponsored by Claranet
WHITE PAPER: Small businesses are popular targets for today’s hackers. However, by investing in right cybersecurity tools, these small businesses can significantly reduce their risk and facilitate good business growth. The following white paper provides 4 steps for small business cybersecurity success – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Continuous Security – Putting it all Together
sponsored by HCL Software
WHITE PAPER: Traditionally, Security Maturity models were linear in their approach – suggesting that true security has some sort of end goal. However, cybersecurity requires a more continuous and cyclical approach in order to constantly ensure security is adequate. Read this e-guide to learn more about achieving continuous cybersecurity.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

HCL Software

Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER: Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Motorola, Inc.

Top 10 Reasons For Protecting Your Organization With CipherTrust Data Security Platform
sponsored by Thales
WHITE PAPER: Protected data, continuous compliance and reduced complexity – these are the key pillars of an ideal data security program. Thales’ CipherTrust Data Security Platform aims to meet these 3 objectives to help organizations reduce risk. This white paper lists 10 reasons to consider switching to the platform – read on to see what they are.
Posted: 04 Nov 2020 | Published: 30 Sep 2020

Thales

The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: This white paper, The Key Pillars For Protecting Sensitive Data In Any Organization, outlines the challenges of modern data security, as well as best practices for protecting critical data – read on to learn more.
Posted: 04 Nov 2020 | Published: 30 Sep 2020

Thales

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Sensitive Data Protection in the Retail Card Payments Ecosystem
sponsored by Thales
WHITE PAPER: Securing sensitive data in a cost-effective manner is a significant challenge in processing payment transactions. Year after year, the threat landscape widens as fraudsters think of more sophisticated methods to compromise payment credentials for monetary gain. View this white paper to learn about keeping payment transactions secure.
Posted: 02 Nov 2020 | Published: 30 Sep 2020

Thales

Isolation Best Practices for Financial Services Institutions
sponsored by Menlo Security
WHITE PAPER: Phishing and ransomware attacks, while not necessarily new, are becoming increasingly sophisticated, hard to detect, and dangerous. Read these isolation best practices for yourself to learn how smart financial service institutions are applying this relatively simple concept to stop dangerous attacks before they can reach vulnerable users.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Upgrading Existing Security Systems to Agile Quantum-Safe With Thales Luna HSMs And Thales High-Speed Encryptors
sponsored by Thales
WHITE PAPER: The impending arrival of quantum computing is powerful enough to pose a threat to today’s encryption. View this brief to learn about Thales Luna Hardware Security Modules, Thales High Speed Encryptors, and ISARA’s quantum-safe solutions, which aim to provide quantum-safe security while maintaining backward compatibility with existing systems.
Posted: 02 Nov 2020 | Published: 28 Feb 2020

Thales

Top 10 Considerations When Choosing a Modern Single Sign-On Solution
sponsored by CyberArk Software, Inc
WHITE PAPER: With 80% of all breaches involving compromised or weak credentials, implementing an SSO can provide more robust credential controls and eliminate unnecessary risk. But not all SSO solutions are created equal, and choosing the right one can be challenging. Dive into this white paper to learn the top 10 considerations for selecting an SSO.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

CyberArk Software, Inc

Securing the Future of Work
sponsored by Menlo Security
WHITE PAPER: Access this white paper to learn the top security threats posed to remote workers, use cases of cloud security that can cover the risk, and 4 steps to deploying a cloud-based secure web gateway (SWG) for remote workers with Menlo Security.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: A 24/7 SOC identifies, investigates and resolves threats that target infrastructure, sensitive data, and ongoing business operations. But building a SOC can be time-consuming, complex and expensive, which is why organizations are turning to SOC-as-a-Service (SOCaaS). Read this guide to learn tips for preparing an RFP for a SOCaaS provider.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Cysiv

Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER: With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Blueprint for a Future-Ready Workforce
sponsored by VMware International Unlimited Company
WHITE PAPER: When global events caused companies to rapidly pivot to remote work, IT had to act fast. In terms of PC lifecycle management, it quickly became apparent that legacy approaches were no longer adequate. Advance your strategy by reading this white paper, which offers a blueprint for your journey to a future-ready workspace on Windows 10.
Posted: 27 Oct 2020 | Published: 31 Jul 2020

VMware International Unlimited Company

The Best of Both Worlds: Hybrid IAM Offers Flexibility and Enhanced Security
sponsored by Quest
WHITE PAPER: Within the identity and access management (IAM) market, the cloud segment is experiencing significant growth – especially among distributed workforces. This white paper discusses how cloud has shaped the IAM market and the benefits of cloud/hybrid IAM offerings.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Clouds Are Secure: Are You Using Them Securely?
sponsored by FireMon
WHITE PAPER: There are several unsubstantiated concerns regarding cloud security, but research demonstrates that cloud isn’t inherently insecure – in fact, most cloud security failures are due to user error. This Gartner research report addresses common cloud security misconceptions and offers strategic recommendations for CIOs to implement.
Posted: 27 Oct 2020 | Published: 07 Oct 2019

FireMon
51 - 75 of 1280 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info