IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
76 - 100 of 972 Matches Previous Page  |  Next Page
Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Quantum computing and quantum-safe security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

Driving Resiliency and Security in the Financial Services Industry
sponsored by BMC Software
WHITE PAPER: Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC Software

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Auth0’s Approach to Information Security Identity in the Real World: the Tao of Extensibility
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Mistakes To Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER: In this e-book, take a look at some use cases where security orchestration’s capabilities can help simplify, automate, and improve efficiencies of incident response and security operations.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Palo Alto Networks

Five Pillars of an actionable Cloud Security Framework in Azure
sponsored by Barracuda
WHITE PAPER: In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Barracuda

2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER: Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Proofpoint

The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER: In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Palo Alto Networks

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

EXECUTIVE BRIEF: WHY SECURE MOBILE ACCESS IS A STRATEGIC BUSINESS IMPERATIVE
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella

Vulnerability Management 2020
sponsored by TechTarget
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

TechTarget

RANSOMWARE REALITIES FOR SMALL AND MEDIUM-SIZED BUSINESSES
sponsored by Crowdstrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

Crowdstrike

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Redefining Security Analytics with Chronicle
sponsored by Chronicle
WHITE PAPER: Historically, most analysis and complex detection capabilities have been bundled together into a technology called a “SIEM.” In this Google Cloud Whitepaper, take an in-depth look at Chronicle’s global security telemetry platform, designed as the answer to the question: What would SIEM look like if it were invented today?
Posted: 19 May 2020 | Published: 19 May 2020

Chronicle

THE EVOLUTION OF RANSOMWARE: HOW TO PROTECT ORGANIZATIONS FROM NEW TRENDS AND METHODS
sponsored by Crowdstrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

Crowdstrike

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Justify Your Vulnerability Management Program
sponsored by TechTarget
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

TechTarget

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare
76 - 100 of 972 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences