IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
76 - 100 of 1103 Matches Previous Page  |  Next Page
Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

The SIEM's Buyers Guide for 2020
sponsored by Splunk
WHITE PAPER: In short, a SIEM is a security platform that ingests event logs and offers a single view of this data with additional insights—but as with all growing tech offerings right now, its current capabilities may be far more than you are aware. Read this white paper to learn about the evolution of SIEM, and 9 technical capabilities of a modern SIEM.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Splunk

Fortinet SD-Branch Secures the Network Edge at the Branch
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Fortinet Private Cloud Security Solutions: Use Cases for Comprehensive Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations that invest in hybrid cloud infrastructures often realize significant business value, however; private clouds bring their own unique security challenges. In this white paper, explore 5 key uses cases for private cloud security and discover the benefits of Fortinet's private cloud security solution.
Posted: 13 Aug 2019 | Published: 02 Apr 2019

Fortinet, Inc.

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

PeopleSoft Single Sign-On
sponsored by Appsian
WHITE PAPER: Explore how Appsian's Peoplesoft SSO Connecter can help your organization ensure its PeopleSoft applications work seamlessly within your enterprise environment. Learn about the challenges of off-the-shelf SSO software, and discover how Appsian's PeopleSoft SSO Connecter can help your organization improve security, boost productivity, and more.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Appsian

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

The California Consumer Privacy Act of 2018
sponsored by TITUS
WHITE PAPER: In this solution brief, discover more about how TITUS enhances CCPA compliance and its solution features and benefits.
Posted: 30 Jul 2019 | Published: 19 Jun 2018

TITUS

Protecting Your IT Assets from Cryptomining Malware
sponsored by Neustar
WHITE PAPER: Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. In this white paper learn everything you need to know about cryptomining including what it does, how it gets in, and how to recognize and prevent it.
Posted: 30 Jul 2019 | Published: 19 Jul 2019

Neustar

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

Acalvio Deception and the NIST Cybersecurity Framework 1.1
sponsored by Acalvio
WHITE PAPER: The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.
Posted: 23 Jul 2019 | Published: 30 Jun 2018

Acalvio

DIY or NSP? Finding the optimal approach to deploying a next-generation SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper from Windstream Enterprise, discover the key considerations as organizations demand a rapid response to updating the WAN to support a modern digital business.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

5 practical tips for implementing SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper, discover Forrester's 5 practical tips for implementing SD-WAN in your organization.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Personnel Administration and Security Solution for Federal Agencies
sponsored by Appian
WHITE PAPER: In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.
Posted: 17 Jul 2019 | Published: 17 Jul 2019

Appian

3 Steps to Securing Enterprise Data on Cloud Platforms
sponsored by ReliaQuest
WHITE PAPER: Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

Critical Steps to a More Secure Mobile Environment in 2019
sponsored by Vox Mobile Solutions
WHITE PAPER: In this check list, discover the 10 crucial steps to achieve a more secure mobile environment in 2019.
Posted: 02 Jul 2019 | Published: 02 Jul 2019

Vox Mobile Solutions

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology
76 - 100 of 1103 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement