IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 3101 Matches Previous Page  |  Next Page
Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
RESOURCE: As security pros struggle with how to keep up with non-stop treats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. Take a look at this 67-page guide for a better understanding about DLP technologies and how the 10+ year old technology has evolved.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

The State of Security Automation Architectures: Consolidated Key Findings
sponsored by Juniper Networks
RESEARCH CONTENT: Learn about the growing importance of a security automation architecture to cybersecurity by exploring some of the Ponemon Institute's key findings about the role of automation in incident response, security analytics, SIEM, and more.
Posted: 17 Jul 2018 | Published: 30 Apr 2018

Juniper Networks

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

Security Built to Work Outside the Perimeter: 3 Reasons to Choose Adaptive Multi-Factor Authentication
sponsored by Okta
WHITE PAPER: Download this resource to compare 2-Factor Authentication, Multi-Factor Authentication and Adaptive Multi-Factor Authentication and learn which option can provide your organization with the security measures you need.
Posted: 16 Jul 2018 | Published: 16 Jul 2018

Okta

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

CW ANZ – July 2018: Fix the weak links
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

ComputerWeekly.com

6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

CW Middle East ezine July 2018
sponsored by ComputerWeekly.com
EZINE: What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
Posted: 09 Jul 2018 | Published: 12 Jul 2018

ComputerWeekly.com

McAfee Cloud Security for Salesforce
sponsored by McAfee, Inc.
WHITE PAPER: McAfee® Skyhigh Security Cloud for Salesforce helps organizations securely accelerate their business by providing total control over data and user activity in Salesforce. Learn more about 25 key features of the software in this data sheet.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

McAfee, Inc.

McAfee Skyhigh Security Cloud for Office 365
sponsored by McAfee, Inc.
RESOURCE: Use this resource to take an in-depth look at McAfee Skyhigh Security Cloud for Office 365 to help your organization securely accelerate your business by providing total control over data and user activity.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

How to Secure Data in the Cloud
sponsored by McAfee, Inc.
WHITE PAPER: Access this white paper to find out how to protect data where it increasingly lives today, in the cloud.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

Keeping SIEM Simple and Actionable
sponsored by Fortinet, Inc.
WEBCAST: Security information and event management (SIEM) tools can be extremely effective for managing security, performance and compliance. However, SIEMs can often be too complex to be used effectively. Listen in on the webcast to learn how to keep your SIEM simple and actionable
Posted: 03 Jul 2018 | Premiered: Jul 3, 2018

Fortinet, Inc.

Fighting Cybercrime with Artificial Intelligence
sponsored by Fortinet, Inc.
WEBCAST: Download this webcast to learn how AI and machine learning can nullify known malware, and manage new malware before you feel the pain.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Protect Your Mainframe from the Inside Out
sponsored by CA Technologies
RESOURCE: 77% of data breaches come from internal sources, according to the Ponemon Institute. While it would be nice to trust your employees with your mainframe of data, this is not a wise decision. Download this resource to discover how an access management system can protect your mainframe from internal data breaches.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

GDPR: Information Security, Governance and Regulations Working in Unity
sponsored by CA Technologies
ANALYST REPORT: What is data privacy if not data security? Organizations must focus more on data security now that new GDPR regulations are in effect. In this insight report, learn how information governance and IT professionals come together with security software to establish a foundation for GDPR compliance.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

McAfee Skyhigh Security Cloud for Amazon Web Services
sponsored by McAfee, Inc.
RESOURCE: Moving to a cloud-based environment can be intimidating as cyber attacks continue to grow. Use this resource to take an in-depth look at McAfee Skyhigh Security Cloud or AWS, a monitoring, auditing and remediation tool for your AWS environment.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

McAfee, Inc.

GDPR Readiness Starts With the Mainframe: Here's Why
sponsored by CA Technologies
WHITE PAPER: How do you evaluate your GDPR readiness? Download to learn why mainframe teams should be a part of GDPR planning and discover 10 questions your security practitioners should ask to evaluate current GDPR readiness.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

How to Mitigate 5 Network Security Problems Affecting the Financial Industry
sponsored by Ixia - Keysight
WHITE PAPER: Find out how high-priority targets like financial industry organizations can overcome 5 critical IT security challenges, from reducing cybertheft to improving compliance.
Posted: 29 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

The 5 Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
RESOURCE: When IT and business leaders lack visibility into their organization's true level of risk vulnerability, they could be getting exploited at this moment – and not even know about it. Uncover how a modern SOC can improve your security posture with threat intelligence and analytics.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk
1 - 25 of 3101 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement