IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2505 Matches Previous Page  |  Next Page
Identity Insider: Take on the Future
sponsored by SailPoint Technologies
WHITE PAPER: With security such an important topic for literally every person around the world, it's time for people to gain a better understanding of innovations coming to the industry. In the 3rd annual Identity Insider, explore a number of articles which discuss how identity and access management will be affected by innovation in 2020.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

SailPoint Technologies

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Mobile Security Case Study
sponsored by Symantec
CASE STUDY: Your business could not survive without users being empowered by mobile technology. Yet one quarter of organizations have been affected by a security breach that has either resulted in lost data or downtime. In this resource, learn how Symantec is helping 3 companies overcome their mobile endpoint protection challenges.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Securing the Cloud Generation
sponsored by Symantec
ASSESSMENT TOOL: To help organizations migrate to the cloud, Symantec developed an assessment tool which includes learnings they gained when preparing for their move to the AWS cloud. Download this assessment tool to discover a series of questions across 4 domains that can help you evaluate your readiness for the public cloud.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

High Alert Chapter 1: Perfect Storm
sponsored by Symantec
EBOOK: Could burnout in your security teams be putting your business and your data at risk? In Chapter 1 of Symantec's High Alert Series, discover key findings on why cybersecurity teams feel overwhelmed and how you can tackle the cybersecurity overload in 2019.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Work Less. Secure More
sponsored by Symantec
RESOURCE: Today, your InfoSec teams simply can't deal with the exploding number of threats in the cloud and keep pace with your continuous integration and development processes. But intelligent automation can. In this infographic, learn how Symantec Cloud Workload Protection makes sure you never have to sacrifice safety for speed.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

AWS Dynamic Duo Infographic
sponsored by Symantec
RESOURCE: DevOps and InfoSec need to integrate their processes and work collaboratively to secure organizations as their reliance on public cloud infrastructure grows. Download this infographic to discover a 5-step action plan for embracing DevSecOps in your organization.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

High Alert Chapter 2: Skills Crisis Infographic
sponsored by Symantec
RESOURCE: New research from Symantec uncovers the huge challenge organizations face in attracting, retaining and nurturing the right caliber of cybersecurity professionals. Download this infographic to find key statistics from the research. Also, explore 3 ideas for tackling the skills shortage.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

High Alert Chapter 1: Perfect Storm Infographic
sponsored by Symantec
RESOURCE: Could burnout in your security teams be putting your business and your data at risk? Download this infographic for key findings on why cybersecurity teams feel overwhelmed and how you can tackle the cybersecurity overload in 2019.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

High Alert: Tackling Cybersecurity Overload in 2019
sponsored by Symantec
EBOOK: Download this e-book for exclusive new research from Symantec that highlights the challenge that CISOs and security leaders face in trying to find, attract and retain cybersecurity professionals.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Cloud Security: Are You Ready?
sponsored by Symantec
ANALYST REPORT: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 21 Aug 2019 | Published: 30 Jun 2018

Symantec

Data Security for the Way People Work
sponsored by Dell EMC and Microsoft
WHITE PAPER: Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Dell EMC and Microsoft

Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

CyberArk Global Advanced Threat Landscape Report 2019
sponsored by CyberArk Software, Inc
ANALYST REPORT: In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.
Posted: 20 Aug 2019 | Published: 31 Aug 2019

CyberArk Software, Inc

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

How to Up Level your Defenses with Security Analytics
sponsored by Splunk
WHITE PAPER: If you don't have actionable insights to detect and respond to emerging and current threats, you're not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Q2, 2019 Cyberthreats & Trends Report
sponsored by Neustar
ANALYST REPORT: While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.
Posted: 19 Aug 2019 | Published: 12 Aug 2019

Neustar

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019

Proofpoint

Top 10 Security Changes in Red Hat Enterprise Linux 8
sponsored by Red Hat
WEBCAST: In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
Posted: 16 Aug 2019 | Premiered: Aug 16, 2019

Red Hat

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

How IT Administrators Are Tackling Active Directory and Security
sponsored by Zoho
RESOURCE: ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

The IT Director's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 14 Aug 2019 | Published: 31 May 2019

Ping Identity Corporation

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.
1 - 25 of 2505 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement