IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by, powered by an online computer dictionary
Security Management Reports
1 - 25 of 2686 Matches Previous Page  |  Next Page
The Impact Of Xdr In The Modern Soc
sponsored by VMware
ANALYST REPORT: Extended detection and response (XDR) is flourishing in the security arena. ESG, a division of TechTarget, recently surveyed IT/InfoSec pros across multiple industries to better understand the market perception of XDR, the value points and the challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 14 Apr 2021 | Published: 30 Nov 2020


How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Regional Government Builds Adaptable, Proactive Defense Against Tomorrow’s Cyberthreats
sponsored by McAfee
CASE STUDY: An arm of the regional government in Wallonia, Belgium needed to simplify security management over their 10,000 desktops, 1,300 servers and 1,000 major apps. So how were they able to strengthen their posture predictive with intelligence and stronger, lighter endpoint security? View this case study to see how McAfee helped.
Posted: 12 Apr 2021 | Published: 31 Dec 2020


The 10 Essential Capabilities Of A Best-of-breed Soar
sponsored by Splunk
WHITE PAPER: Security analysts face high alert volumes, an overload of point-products to manage and a shortage of skilled talent. Security orchestration, automation and response (SOAR) tools have served as remedies, but not all of these tools are created equal. In this white paper, Splunk outlines 10 capabilities to look for when evaluating SOAR technology.
Posted: 09 Apr 2021 | Published: 09 Apr 2021


Are you Ready for XDR?
sponsored by McAfee
WEBCAST: If your security team is struggling with limited time, resources and intelligence – or if you’re trying to get a security operations center (SOC) off the ground – then the time has come to seek out more visibility. View this webinar to learn how extended detection and response (XDR) can help eliminate network, endpoint and cloud blind spots.
Posted: 09 Apr 2021 | Premiered: Apr 9, 2021


McAfee MVISION Unified Cloud Edge (UCE) Demo
sponsored by McAfee
WEBCAST: In a world where users are moving to the cloud, wouldn't it be great to combine a CASB, web protection and data loss prevention – and manage it all in one place? View this video to learn about a platform that offers unified protection of enterprise data and defense from modern threats at the cloud edge.
Posted: 09 Apr 2021 | Premiered: Apr 9, 2021


The Fundamental Guide To Building A Better Soc
sponsored by Splunk
RESOURCE: There simply isn’t enough skilled security talent out there, and that which does exist is expensive. So what are companies who rely on dinosaur technology to do? They need to start building a next generation, modern SOC, today. Download your complimentary copy of The Fundamental Guide to Building a Better Security Operation Center (SOC) today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021


How To Design Your Security Operations Center (Soc) To Work Smarter, Not Harder
sponsored by Splunk
WHITE PAPER: At the moment, security teams are dealing with limited resources and talent to stop unrelenting, advancing threats. This presents challenges for security operations centers (SOCs), but through more proactive security methods, these challenges can be alleviated. Read this white paper to learn how to design your SOC to work smarter, not harder.
Posted: 08 Apr 2021 | Published: 08 Apr 2021


Carbonite Helps Resellers And Msps Add Resilience To Customer Environments
sponsored by Webroot
WHITE PAPER: Open up this white paper to learn more about the new revenue-generating opportunities that have emerged for MSPs as businesses embrace remote work and the need for managed security services.
Posted: 08 Apr 2021 | Published: 08 Apr 2021


2020 Security Operations Annual Report
sponsored by Arctic Wolf Networks, Inc.
ANALYST REPORT: As the world scrambled to become remote, the complexion of security operations, or SecOps, changed dramatically. Read Arctic Wolf’s Security Operations Report to learn the numbers behind these security changes and how to advance your own SecOps capabilities.
Posted: 01 Apr 2021 | Published: 30 Oct 2020

Arctic Wolf Networks, Inc.

Boosting Expertise in Clinical Engineering atTRIMEDX
sponsored by CyberVista
CASE STUDY: TRIMEDX, a global leader in clinical asset management in healthcare, needed a cybersecurity training program for a clinical engineering workforce of more than 3,100 team members. Download this case study to learn how their partnership with CyberVista helped them prepare employees for the worst that threat actors have to offer.
Posted: 30 Mar 2021 | Published: 30 Mar 2021


Taegis XDR
sponsored by Dell SecureWorks
VIDEO: Security professionals and SecOps teams tend to be stuck with stubborn legacy threat intelligence that provide meager visibility, take ages to configure and give countless false positives. For a SecOps interface that goes beyond legacy SIEMs, view this 9-minute video to explore a demo on Taegis XDR by Dell SecureWorks.
Posted: 26 Mar 2021 | Premiered: 26 Mar 2021

Dell SecureWorks

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

How To Stop Firefighting And Make Security Strategic
sponsored by BROADCOM, Inc
RESOURCE: As much as 80% of the world’s mission-critical data resides on mainframes. As such, you must keep yours secure – but an ad-hoc security strategy, deployed by many an enterprise, simply won’t get it done. Download this resource to learn 5 ways to stop day-to-day security battles and construct a real security strategy to secure your mainframe.
Posted: 26 Mar 2021 | Published: 26 Mar 2021


Top Security and Risk Management Trends
sponsored by Palo Alto Networks
RESOURCE: Acting on the relentless pace of digital business and ongoing transition to the cloud, security and risk management leaders can and must improve resilience, better support business objectives and elevate their organizational standing. View this Gartner resource detailing top security and risk management trends to give you the upper hand.
Posted: 25 Mar 2021 | Published: 27 Feb 2020

Palo Alto Networks

Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
sponsored by
EGUIDE: In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

10 Reasons Msps Should Add Security Awareness Training To Their Offering
sponsored by Webroot
RESOURCE: If you are a managed service provider (MSP) providing industry-leading cybersecurity services, modern malware tactics are too complex to guarantee 100% that your clients will stay safe. But adding security awareness training to your offering may just improve your and your clients’ odds of success. Download this resource to learn 10 reasons why.
Posted: 23 Mar 2021 | Published: 18 Dec 2020


The Importance of Security Awareness Training
sponsored by Vipre
EBOOK: The importance of security awareness in today’s climate cannot be understated. But much of the time, leadership will still turn a blind eye to security awareness – they believe that investing in the right technology will do well enough. Browse this e-book to learn the 5 key components to convincing leadership to invest in security awareness.
Posted: 18 Mar 2021 | Published: 18 Mar 2021


The Business Value of iboss cloud Enterprise Security Solutions
sponsored by iBoss
ANALYST REPORT: Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.
Posted: 18 Mar 2021 | Published: 31 Jan 2020


Protecting Your Organisation By Empowering Your Employees
sponsored by Vipre
RESOURCE: More often than not, today’s organizations would rather automate security processes than take time and spend money training their employees on it. But the problem lies in that hackers have an easier time tricking people than machines, so security awareness cannot go away. Read up on 3 tips to keep your employees engaged in security.
Posted: 15 Mar 2021 | Published: 15 Mar 2021


Identity Defined Security Framework
sponsored by CyberArk Software, Inc
WHITE PAPER: The explosion of cloud, mobile devices and IoT, as well as the consumerization of IT, have all increased cyber risk due to compromised identities, accounts and credentials. But now, organizations are recognizing the importance of bringing identity and security together. Browse this white paper to discover identity defined security.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

CyberArk Software, Inc

Remote Workers, Secured
sponsored by Cisco Powered
RESOURCE: Today’s organizations need a strong collaboration tool that’s compliant, provides visibility and control, and combines with the security needed to achieve a complete remote work solution. Open this infographic to learn about the combination of Cisco Webex and Cisco Secure Remote Worker, striving to offer strong, secure collaboration and compliance.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

Cisco Powered

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Servicenow Finds The Smarter Way To Segment Using Illumio
sponsored by Illumio
CASE STUDY: ServiceNow is a premier cloud platform for IT service management. When they identified the need to address a flat network and properly secure their domain controllers and core services, they knew it was time to refine their network segmentation strategy. Leverage this case study to see how Illumio’s Secure Cloud platform delivered value.
Posted: 05 Mar 2021 | Published: 05 Mar 2021


Retiring Web Access Management (WAM)
sponsored by Okta
DATA SHEET: Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

1 - 25 of 2686 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences