IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
101 - 125 of 2641 Matches Previous Page  |  Next Page
State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Italy's Largest Service Provider Leverages Security to Address Cybercrime Threats
sponsored by Cisco Umbrella
CASE STUDY: As multiple studies revealed that Italy’s businesses grew increasingly vulnerable to data breaches & cyberattacks, Telecom Italia (TIM) was already working on a way to protect its 600,000+ customers from cybercrime. In this case study, discover how TIM was able to leverage security to meet this challenge.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

The Road to Security Operations Maturity
sponsored by Siemplify
WHITE PAPER: Modern security operations (SecOps) programs aren’t meeting performance needs, and there is little consensus on how to improve this. In order to address this, the Cyentia Institute recently conducted research into the SecOps journeys of a variety of organizations. Read on to uncover the key findings from their study.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Siemplify

The No-Nonsense Guide to Security Operations Metrics
sponsored by Siemplify
WHITE PAPER: Given that it’s difficult to define & measure success when it comes to cybersecurity, companies must carefully consider the appropriate KPIs to use when setting their security goals. In this guide, learn about how business, operational & improvement metrics can measure the efficacy of your cybersecurity operations program.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Siemplify

Identity & Access Management – Securing the Modern Workplace With Microsoft 365
sponsored by Core BTS
WHITE PAPER: Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Core BTS

Integrating Password and Privilege Management for Unix and Linux Systems
sponsored by BeyondTrust Corporation
WHITE PAPER: With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.
Posted: 06 Nov 2019 | Published: 31 Jan 2019

BeyondTrust Corporation

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: The volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses are not enough. In this e-book, discover challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities
sponsored by Fidelis
ANALYST REPORT: When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.
Posted: 05 Nov 2019 | Published: 30 Sep 2019

Fidelis

Cisco Umbrella: Reporting You Can Count On
sponsored by Cisco Umbrella
RESOURCE: Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cisco Umbrella

Defense in Depth: Key Learnings for Achieving Detector and Response
sponsored by Verizon
WEBCAST: Join Gene Stevens and Dave Gold, executive leaders from ProtectWise who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today.
Posted: 05 Nov 2019 | Premiered: Nov 5, 2019

Verizon

Fortune 100 Insurance Company Case Study
sponsored by CyberArk Software, Inc
CASE STUDY: Securing privileged access to robotic credentials was a top priority for the CVP of Privileged Access Management at a Fortune 100 Insurance Company. In this case study, learn how they implemented CyberArk Blue Prism integration to secure Robotic Process Automation (RPA) deployments and accelerate operational agility.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

CyberArk Software, Inc

Just-In-Time (JIT) Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Always-on privileged access presents a massive risk surface to data breaches, & traditional security is limited in their detection against these threats. A strategy called just-in-time (JIT) privileged access can help by limiting the time an account has certain access. Read more about JIT & why you should include it in your policy.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

10 Must-Ask Questions When Choosing a SOAR Solution
sponsored by Siemplify
RESOURCE: With an increasing number of SOAR solutions in the market, each with a different approach, asking the correct questions to get the right platform is key. Dive into this brief infographic to discover the 10 questions you should ask when selecting the best SOAR platform for your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Siemplify

A Computer Weekly buyer's guide to robotic process automation
sponsored by ComputerWeekly.com
EGUIDE: Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
Posted: 05 Nov 2019 | Published: 05 Nov 2019

ComputerWeekly.com

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales

Don’t Let Misconfigurations Leave a Hole in Your Firewall
sponsored by FireMon
PRODUCT OVERVIEW: Human error is inevitable in manual processes. In this product overview, discover the 10 misconfigurations that cause data breaches and how FireMon Automation can help to eliminate them.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

FireMon

Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities (video)
sponsored by Fidelis
VIDEO: In this video, Matt Bromiley, SANS Analyst and Incident Responder, and Gerald Mancini, Senior Vice President of Engineering at Fidelis, discuss elevating enterprise security with Fidelis Cybersecurity in the endpoint security platform. Watch to learn more.
Posted: 05 Nov 2019 | Premiered: 04 Nov 2019

Fidelis

Privileged Access Threat Report 2019
sponsored by BeyondTrust Corporation
WHITE PAPER: 2020 is approaching and issues around employee & vendor access are not going away. But it’s possible to improve the visibility of threats & increase the confidence over an IT environment’s security. That’s where Privileged Access Management (PAM) comes into play. View this report for tips on managing insider access, vendor risk & more.
Posted: 04 Nov 2019 | Published: 04 Nov 2019

BeyondTrust Corporation

Five Steps To A Zero Trust Security Strategy Q&A
sponsored by Ionic Security
WHITE PAPER: Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ionic Security

Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception
sponsored by Fidelis
WHITE PAPER: As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.
Posted: 01 Nov 2019 | Published: 30 Sep 2019

Fidelis

Improving Cybersecurity with ITAM: An Equifax Case Study
sponsored by Snow Software
WEBCAST: Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Snow Software

Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels
sponsored by CyberArk Software, Inc
WHITE PAPER: In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

CyberArk Software, Inc
101 - 125 of 2641 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement