IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2961 Matches Previous Page  |  Next Page
Log Management Basics: Enhance Security and Compliance
sponsored by BalaBit
WHITE PAPER: Whether you are trying to enhance security, improve operations, meet compliance objectives, or draw business insights from your IT environment, log data contains valuable information, and harnessing that data is critical. Access this white paper to uncover 3 security challenges that can be solved by log management.
Posted: 26 Apr 2018 | Published: 26 Apr 2018

BalaBit

Exposed and Unprotected in Cloud Environments: Why Modern Threat Prevention Security Needs to Be Part of Your Cloud Strategy
sponsored by Tech Data - Check Point/Mosaic451
WHITE PAPER: This white paper explores how to overcome the first-hand challenges organizations face when moving business-critical assets to the cloud to ultimately close the cloud security gap.
Posted: 26 Apr 2018 | Published: 26 Apr 2018

Tech Data - Check Point/Mosaic451

How to Build a Security Strategy
sponsored by Proofpoint, Inc.
VIDEO: The healthcare industry still lags other industries in deploying commonly accepted security technology. In this webinar, learn about the current state of healthcare security and how to build and implement a holistic security architecture.
Posted: 25 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Gain an Edge with Cloud Security
sponsored by Oracle Corporation
WHITE PAPER: ISACA predicts there will be a global shortage of 2 million cybersecurity professionals by 2019. Learn how cloud security services can help you tackle the top security challenges facing enterprises today: scarcity of talent, security alert overload, sophisticated threats, and more.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

Oracle Corporation

Advanced Security Protections for Public Cloud Environments
sponsored by Tech Data - Check Point/Mosaic451
WHITE PAPER: How can you protect your cloud environments as threats become more sophisticated? Access this brief resource for an overview of CloudGuard for Alibaba Cloud.
Posted: 25 Apr 2018 | Published: 31 Jan 2018

Tech Data - Check Point/Mosaic451

How to Secure Complex Cloud Environments and Reduce Costs With Sophos UTM on Amazon Web Services
sponsored by AWS - Sophos
WHITE PAPER: Inside, explore how you can keep your data protected from common threats over HTTP/HTTPS without incurring excessive costs or restricting innovation.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

AWS - Sophos

Integrating, Coordinating, and Orchestrating Enterprise Security Tools
sponsored by Proofpoint, Inc.
VIDEO: Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today.
Posted: 24 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Oracle CASB Cloud Service
sponsored by Oracle Corporation
DATA SHEET: Find out how to protect your entire cloud footprint and why the right tools use automated security monitoring along with your existing security investments through a simple deployment.
Posted: 24 Apr 2018 | Published: 29 Dec 2017

Oracle Corporation

MalwareBytes Endpoint Protection: Advanced Threat Prevention
sponsored by Tech Data - MalwareBytes
RESOURCE: Access this resource to learn about MalwareBytes Endpoint Protection, a security tool that uses a layered approach with multiple detection techniques.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

Tech Data - MalwareBytes

Top Cybersecurity Threats In 2018
sponsored by Lynx Technology Partners
RESEARCH CONTENT: This Forrester Research Report analyzes common attack patterns responsible for breaches in 2017 to help security and risks pros be prepared and prioritize their security strategy throughout 2018.
Posted: 24 Apr 2018 | Published: 27 Nov 2017

Lynx Technology Partners

I Spy PII
sponsored by SAS
WHITE PAPER: This white paper provides information on how to protect your business with a 5-step approach to data protection. Also included are snapshots of tools that you could add to your data protection toolbox.
Posted: 24 Apr 2018 | Published: 31 Dec 2017

SAS

Data protection: A business imperative
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

ComputerWeekly.com

Busting Financial Crime with Machine Learning
sponsored by TIBCO
WHITE PAPER: In this white paper, learn how machine learning can produce more efficient fraud protection through supervised and unsupervised learning algorithms, which reduce cases of fraud while also reducing time spent investigating fraud red flags.
Posted: 23 Apr 2018 | Published: 12 May 2017


Multi-Vector Protection: Defense-in-Depth With Layered Techniques for Corporate Endpoints
sponsored by Tech Data - MalwareBytes
RESOURCE: Corporate endpoints are under constant attack. According to the Verizon 2017 DBIR 51% of corporate breaches included malware. Access this resource to find out why securing your organization's endpoints requires multi-layered protection techniques.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Tech Data - MalwareBytes

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: There are 6 scenarios where you and your customers are prone to fraud. In this white paper, discover these common scenarios and learn how a fraud detection platform can identify risks within your organization.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Splunk

Contractor Cyber Risk Continues to Grow
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Access this resource to learn 3 strategies to mitigate risk when hiring an outside contractor for your networking needs.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

Securing MacOS in the Modern Work Era
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover a UEM platform for Mac devices that doesn't require integrations or additional training, and is seamless for end users, improves operational efficiency, and simplifies IT operations across the device lifecycle.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

MobileIron

Helping Address GDPR Compliance
sponsored by Oracle Cloud
WHITE PAPER: This white paper explores how to address GDPR with a coordinated strategy built to identify threats, reduce risk, and maintain continuous compliance. Learn about a variety of security tools, stationed both on-premise and in the cloud, that are designed to help you discover, monitor, and encrypt sensitive data.
Posted: 05 Apr 2018 | Published: 31 Jul 2017

Oracle Cloud

Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE: Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

SearchSecurity.com

Testing Endpoint Security: An Introductory Guide
sponsored by Sophos
WHITE PAPER: In this 25-page white paper, explore how to successfully test endpoint security software. Find out how testing a wide range of features in multiple scenarios is the best way to have clarity on how effective an endpoint security product can be against the advances that attackers have made in recent years.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

Maintaining Core Capabilities Through a Platform Shift
sponsored by Flux7 Labs
CASE STUDY: When shifting platforms, ensuring the safety of data is often one of the top concerns of a company. Discover how one business maintained their high security standards while still gaining access to the benefits of their new platform.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Flux7 Labs

Infosec culture: A former helicopter pilot's perspective
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

ComputerWeekly.com

The time is ripe to implement cybersecurity automation
sponsored by SearchSecurity.com
EBOOK: It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

SearchSecurity.com

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates
1 - 25 of 2961 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement