IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
101 - 125 of 2435 Matches Previous Page  |  Next Page
Carnival Navigates Sea of Data With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

How to Align with the NIST Cybersecurity Framework
sponsored by Forescout
EBOOK: Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by Forescout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

The Managed Print Services Market
sponsored by Kyocera Document Solutions UK
RESOURCE: Security is a major concern for financial organizations due to the volume of sensitive personal data flowing in and out on a daily basis. It is essential for financial organizations to evaluate their print security. In this article, learn more about why security matters in the managed print services market, especially in the financial sector.
Posted: 20 Mar 2019 | Published: 06 Jul 2018

Kyocera Document Solutions UK

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk Services UK Ltd
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk Services UK Ltd

Complying with CECL
sponsored by SAS
WHITE PAPER: The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.
Posted: 19 Mar 2019 | Published: 26 Apr 2018

SAS

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

Managed Security Service Providers for Dummies
sponsored by Rackspace VMware
WHITE PAPER: One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. In Managed Security Service Providers for Dummies, learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

Rackspace VMware

Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

Avast Business Secure Web Gateway
sponsored by Avast Business
WEBCAST: It's no secret that users pose one of the biggest threats to business security today – whether it's clicking on suspicious email links or visiting unsafe websites. In this webcast, learn how the new Avast Business Secure Web Gateway protects SMBs from sophisticated web threats while being easily manageable and fully scalable.
Posted: 15 Mar 2019 | Premiered: Mar 4, 2019

Avast Business

Security Analytics Platforms, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.
Posted: 15 Mar 2019 | Published: 21 Sep 2018

LogRhythm, Inc.

Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Secure Print Services Are Key to Digital Transformation
sponsored by HP
RESOURCE: Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Why Differential Privacy Should Be Top of Mind for Data Science and Governance Teams
sponsored by Immuta, Inc
WHITE PAPER: Download this white paper to find out why differential privacy should be top of mind for data science and governance teams and uncover the 2 common approaches when it comes to differential privacy.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Immuta, Inc

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

Security and Efficiency Benefits Realized With HP MPS and HP Access Control
sponsored by HP
CASE STUDY: Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.
Posted: 13 Mar 2019 | Published: 31 Jan 2017

HP

Privacy and Data Protection Podcast
sponsored by Micro Focus & PwC
PODCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 12 Mar 2019 | Premiered: Mar 7, 2019

Micro Focus & PwC

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose
sponsored by MASERGY
WHITE PAPER: The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

MASERGY

HP Managed Print Services: Topics of influence
sponsored by HP
WHITE PAPER: Your organization is continuously creating confidential data that's crucial to operations. And you're probably using multiple security methods to protect this data. But is your printing environment as secure as the rest of your infrastructure? In this white paper, learn how HP strengthens security throughout your printing environment.
Posted: 12 Mar 2019 | Published: 30 Jun 2018

HP

Technology's Role in Data Protection - The Missing Link in GDPR Transformation
sponsored by Micro Focus & PwC
WHITE PAPER: The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.
Posted: 11 Mar 2019 | Published: 31 Oct 2017

Micro Focus & PwC

Revitalizing Privacy and Trust in a Data-Driven World
sponsored by Micro Focus & PwC
RESEARCH CONTENT: Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Micro Focus & PwC
101 - 125 of 2435 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement