IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 3557 Matches Previous Page  |  Next Page
The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

SecureWorks and McLaren Partnership
sponsored by Dell SecureWorks
VIDEO: SecureWorks is the security partner of McLaren Group. Using SecureWorks has allowed McLaren to accelerate threat detection. SecureWorks applies machine learning as well as human and artificial intelligence to process logs. In this webcast, Jonathan Neal and Paul Brimacombe discuss their experience partnering with SecureWorks.
Posted: 12 Dec 2018 | Premiered: 10 Dec 2018

Dell SecureWorks

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

The Forrester Wave: Managed Security Services Providers (MSSPs)
sponsored by Dell SecureWorks
RESOURCE: This Forrester report covers a 26-criterion evaluation of European management security service providers (MSSPs). It identified the most significant MSSPs along with researching, analyzing and scoring them. The report also shows how each provider measures up and helps security leaders make the right choice.
Posted: 11 Dec 2018 | Published: 19 Nov 2018

Dell SecureWorks

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Modern Two-Factor Authentication: Easy. Affordable. Secure
sponsored by Duo Security
WHITE PAPER: The ease of stealing IDs and passwords has led to criminals targeting organizations of all sizes. However, two-factor authentication stops easy access to stolen credentials by requiring a second level of authentication. Find out why deploying two-factor authentications may be a better choice for your company.
Posted: 07 Dec 2018 | Published: 31 Dec 2013

Duo Security

MSSP Buyer's Guide: For Security Orchestration & Automation Platforms
sponsored by Siemplify
WHITE PAPER: As the MSSP market continues to flourish, customer demand and intense competition places margins under constant pressure. This guide outlines the challenges faced by MSSPs and sets out the criteria to consider when presented with orchestration as a solution. It also provides direction regarding the implantation of orchestration.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Siemplify

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Manage Risk and Compliance with ServiceNow GRC
sponsored by ServiceNow
RESOURCE: The global regulatory environment continues to evolve making it imperative for organizations to have an integrated risk program. Are you well-positioned to monitor, prioritize, and automate response to business risks in real time? Learn about ServiceNow GRC – an option that could help you ensure rapid identification and response to risk.
Posted: 05 Dec 2018 | Published: 31 Dec 2018

ServiceNow

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
WHITE PAPER: End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.
Posted: 05 Dec 2018 | Published: 13 Nov 2018

MediaPRO

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Zero Trust Threat Prevention, Q3 2018
sponsored by Cyxtera
RESEARCH CONTENT: This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention. Read on to find out which one is the best for your organization.
Posted: 03 Dec 2018 | Published: 12 Jul 2018

Cyxtera

Are You Monitoring and Protecting Your Company's Digital Footprint?
sponsored by Proofpoint, Inc.
EBOOK: Although your digital presence is critical to providing a cohesive customer experience, it also exposes your company to security risks. Access this e-book to learn how to better monitor and secure your organization's digital footprint in 3 steps, even if you don't have an official brand presence in one.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic
1 - 25 of 3557 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement