IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
151 - 175 of 2549 Matches Previous Page  |  Next Page
Managing Customer & Partner Identities
sponsored by Okta
WHITE PAPER: As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Dutch organisations demand more from government
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

ComputerWeekly.com

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

How Connected are your Cyber Operations and Business Objectives?
sponsored by Optiv
RESOURCE: Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Identity Layer for Web and Mobile Applications
sponsored by Okta
DATA SHEET: This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach
sponsored by Optiv
CASE STUDY: In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Adding Advanced Capabilities into Today's SOC
sponsored by Optiv
ANALYST REPORT: View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

NIST Maturity Report
sponsored by Optiv
RESOURCE: The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Evolve your Security Operations Center
sponsored by Optiv
WEBCAST: Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019

Optiv

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Extreme AI Security
sponsored by Extreme Networks
PRODUCT OVERVIEW: In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Extreme Networks
151 - 175 of 2549 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info