IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 3386 Matches Previous Page  |  Next Page
DDoS is the New Spam: 3 Strategies to Turn Catastrophe into Annoyance
sponsored by F5 Networks
EBOOK: DDoS isn't going away anytime soon, and as attacks and motivations evolve, so must IT security defenses. Download this e-book for 3 strategies on how to up your DDoS game, today.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report, where they analyze the samples that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
ANALYST REPORT: As the market for security awareness computer-based training (CBT) is evolving, vendors are seeking out ways to differentiate their products and services to attract security and risk managers. In this Gartner Magic Quadrant market trends report, determine which security awareness CBT vendor is best for your enterprise.
Posted: 20 Sep 2018 | Published: 24 Oct 2017

MediaPRO

Closing the IT Security Gap with Automation & AI in the Era of IoT: Global
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: In this report, discover the research the Ponemon Institure conducted to further understand the reasons for the gap in modern IT security programs and strategies.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Hewlett Packard Enterprise

Pillars of Protection: A New View of Enterprise Security
sponsored by Oracle Corporation
WHITE PAPER: Download this white paper for a look at a security technology that allows you to protect your entire enterprise; the people, the platform and the data, while staying ahead of incoming cyberattacks.
Posted: 19 Sep 2018 | Published: 31 Jul 2018

Oracle Corporation

Helping Noble Group to Secure its Global Network
sponsored by British Telecommunications PLC
CASE STUDY: The Noble Group, a Hong Kong-based global banking company needed to maintain their highest standards of network security. Since their whole business revolved around real-time, online global trading, it was crucial to have a secure and dependable network. Read on to learn about the security services they implemented.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

British Telecommunications PLC

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Cloud Security Foundations
sponsored by Forcepoint
VIDEO: In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.
Posted: 17 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

Building a Smart City Starts with Security
sponsored by One Identity
CASE STUDY: Smart-city technologies support exciting innovations while improving quality of life for citizens. But, with more sensors collecting data in the field, comes greater security risks. Find out how one city was able to develop their smart capabilities while mitigating security risks.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
VIDEO: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 17 Sep 2018 | Premiered: 31 Aug 2018

Forcepoint

Building Nation-Level Defenses to Fight Cybercrime
sponsored by British Telecommunications PLC
RESOURCE: Download this resource learn about a defensive strategy to protect your organization's assets and fight cybercrime, today.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

British Telecommunications PLC

How We Stay Ahead of a Changing Threat Landscape
sponsored by British Telecommunications PLC
RESOURCE: The security threat landscape is confusing and changing rapidly – there's so much out there, how do you understand where the true risks are? In this article, learn about how British Telecommunications is responding to the changing threat landscape and how you can apply this to your organization.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

British Telecommunications PLC

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Advanced Bot Management
sponsored by Oracle Dyn
RESOURCE CENTER: Download this custom article to learn about an advanced bot manager that will help prevent your organization from falling victim to the bot epidemic.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

The Federal Cyber AI IQ Test
sponsored by IBM
RESEARCH CONTENT: With the abilities to track human behavior and detect threats with greater speed and efficiency, AI has the potential to change the course of cybersecurity for government agencies and keep them a step ahead at all times. Download The Federal Cyber AI IQ Test to learn more.
Posted: 14 Sep 2018 | Published: 14 Nov 2017

IBM

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics
sponsored by Empow Cyber Security
RESOURCE: Many CISOs deal with the daily frustration of uncertainty with the performance of their security products in their organization's arsenal. Find out how empow's new Security Diagnostics Service can shed the light on your organization's security and help eliminate this daily issue.
Posted: 14 Sep 2018 | Published: 24 Apr 2017

Empow Cyber Security

How VPNs and Firewalls Put Your Organization at Risk
sponsored by Cyxtera
RESOURCE: Traditional VPNs and firewalls have gone relatively unchanged over the last 20 years, yet technology and the ways in which people connect have seen significant change. Download this resource to discover big network security problems you may face if you don't update your security systems soon.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Cyxtera

Understanding API Security
sponsored by Oracle Dyn
RESOURCE CENTER: As an IT security professional, how do you go about reducing risk and increasing protection for your organization? Dive into this article for some of the most frequently asked questions about API security.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

The SIEM That Gives SIEM a Good Name and Gives Your ROI a Big Boost
sponsored by Empow Cyber Security
RESOURCE: Is your current SIEM platform creating more problems than it solves? Download this resource to find out how you can implement a new SIEM platform to enhance your company's overall security and increase ROI.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

University of Oklahoma Case Study
sponsored by Empow Cyber Security
CASE STUDY: In this case study, learn how The University of Oklahoma overcame its biggest security and compliance struggles after implementing a new SIEM platform.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Empow Cyber Security

The 5 Toughest GDPR Challenges to Overcome
sponsored by British Telecommunications PLC
RESOURCE: Technology can advance your business through the future, but it also provides the largest barrier to meeting GDPR compliance. Read on to explore the 5 common security challenges you need to overcome to meet GDPR compliance requirements.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

British Telecommunications PLC

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

Keeping Your Network Safe by Managing The Risk Of Targeted Attacks
sponsored by Illusive Networks
WEBCAST: Cyber attackers often target endpoints and then move laterally through the network. Learn about 2 common types of cyber-attacks and how expert Ivan Foreman recommends eliminating those threats in this webcast.
Posted: 13 Sep 2018 | Premiered: Sep 13, 2018

Illusive Networks
1 - 25 of 3386 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement