IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 3145 Matches Previous Page  |  Next Page
Mattress Firm: Security and innovation
sponsored by Ivanti
CASE STUDY: As enterprises grow, their competitive advantage relies on their ability to innovate. However, too often, IT teams are spending their effort on tedious, manual tasks, limiting their time to innovate. Read this case study to learn how Mattress Firm, through their partnership with Ivanti, were able to address this issue.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

NTT Ltd. and Palo Alto Networks – Secure Access Ecosystem
sponsored by NTT
DATA SHEET: Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

NTT

Remote and @ Risk
sponsored by Dtex
RESEARCH CONTENT: The global shift to enable remote workforces in 2020 created a number of operational hurdles and introduces a series of security risks – the most significant being insider threats. Read this threat report to learn more about the current state of security and how 2020 put organizations at higher risk.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Dtex

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

Dissecting a Chinese APT Targeting Southeast Asian Government Institutions
sponsored by Bitdefender
VIDEO: Advanced persistent threats (APTs) typically follow a similar framework and timeline – with slight variations depending on the target and scope of the attack. This webinar dissects the infamous Chinese APTs targeting southeast Asian governments – focusing on the timeline, tactics and early warning signs of an APT.
Posted: 25 Nov 2020 | Premiered: 25 Nov 2020

Bitdefender

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Turning Over a New Leaf in Your Identity and Access Management Strategy
sponsored by Ivanti
WHITE PAPER: The transition from traditional role-centric identity and access management (IAM) to an effective technology-enabled, policy-driven strategy is a challenge. But a policy-driven path that looks more holistically at identity will be more dynamic and deliver more power and flexibility to IT. Take a look at this white paper to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

How Certification Can Add Assurance for Digital Transformation at Scale
sponsored by Archetype
WEBCAST: The role of security and trust in delivering mass digital transformation will provide significant growth across multiple markets. But it’s important that security leaders move with the times. Watch this 20-minute webinar to learn the device level security baselines that anchor devices, services and insights together.
Posted: 24 Nov 2020 | Premiered: Jul 15, 2020

Archetype

Smart Buildings: Establishing Trust with IoT Security
sponsored by Archetype
RESOURCE: An increasing number of business leaders now see the value of using IoT devices to provide data and insight into the indoor environment, and they’re calling these new smarter spaces ‘connected spaces’. So, what are the benefits of these new spaces, and what hurdles need to be overcome? Read this article to find out.
Posted: 24 Nov 2020 | Published: 24 Sep 2020

Archetype

Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Protecting against insider threats is a tough task for organizations, mainly because harm can be caused maliciously or unintentionally. Tracking user behavior is the key to success in mitigating insider threats, and by reading this white paper, you can learn about User and Entity Behavior Analytics (UEBA) a platform that may be up to the task.
Posted: 24 Nov 2020 | Published: 08 Sep 2020

Exabeam

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

How to Build a Robust Cyber Threat Intelligence Program
sponsored by DomainTools
WEBCAST: Organizations looking to implement cyber threat intelligence (CTI) grapple with two challenges: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. Watch this SANS webinar to see how to develop an effective CTI program despite these challenges.
Posted: 24 Nov 2020 | Premiered: Aug 18, 2020

DomainTools

Spotting a Denial-of-Service (DoS) Attack
sponsored by Farsight Security
RESOURCE: DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Farsight Security

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

IDC Technology Spotlight: Threat Visibility and Management are Critical in Managed Security Services
sponsored by Comcast Business
RESOURCE: As cyberattackers become better, faster and more sophisticated, security teams are forced to upgrade their ability to detect and respond to intrusions. These professionals face a growing number of security alerts that may or may not reveal a true threat. Read this article to see how managed service providers may be able to help.
Posted: 24 Nov 2020 | Published: 05 Oct 2020

Comcast Business

3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE: Even though research suggests that security focused on protecting the perimeter is obsolete, organizations continue to invest resources towards this effort. Modern threats require a shift in cybersecurity mindset – an approach focused on protecting the people. Read on to learn more about this approach and how to implement it.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Cyber Resilience as a Competitive Advantage
sponsored by Comcast Business
RESOURCE: Now more than ever, customers are attuned to the impact of security threats to their own data. As a result, having strong cyber resilience may grant your organization an unexpected competitive advantage. Read this article to learn 6 cybersecurity best practices that will build your resilience in a way that can help you stand out from the crowd.
Posted: 24 Nov 2020 | Published: 08 Oct 2020

Comcast Business

Understanding the Shared Security Model for Cloud Data Protection
sponsored by InteliSecure
EGUIDE: The new normal has organizations continuing to enable a largely remote workforce – leading to mass cloud migrations. Contrary to a popular misconception about cloud, these migrations could actually strengthen your security posture. Read this InteliSecure guide to find out how.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

5 Ways a CISO Can Tackle the Cybersecurity Skills Shortage Now
sponsored by Claranet
WHITE PAPER: Every CISO knows that finding skilled security staff these days is not only hard but getting harder. In this white paper, uncover 5 practical steps you can take to help you tackle the cybersecurity skills shortage now.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

Remote Workforce Security Report 2021
sponsored by Dtex
RESEARCH CONTENT: Securing the remote workforce has become a critical priority for organizations affected by the closing of offices and workplaces in the wake of the ongoing COVID-19 pandemic. Download this Remote Workforce Security Report to learn more about how you can protect your organization against evolving threats and during challenging times.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Dtex

Compliance for Today’s Complex Audit
sponsored by Ivanti
EGUIDE: The stress and worry surrounding compliance audits are avoidable – so long as your organization adopts a people-centric, policy-automated approach to IT operations that’s inherently audit-ready. But how should you go about this? Read this following e-guide, Compliance for Today’s Complex Audit, which offers a blueprint for this approach.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Ivanti
1 - 25 of 3145 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info