IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
176 - 200 of 2501 Matches Previous Page  |  Next Page
Personnel Administration and Security Solution for Federal Agencies
sponsored by Appian
WHITE PAPER: In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.
Posted: 17 Jul 2019 | Published: 17 Jul 2019

Appian

Tackling the Visibility Gap in Information Security
sponsored by ReliaQuest
ANALYST REPORT: Read on to uncover the most tangible pain points in security management and the emerging mandate required from people, processes and technology to continue optimizing threat protection.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

ReliaQuest

Cybersecurity Trailblazers Make Security Intrinsic to Their Business
sponsored by VMware
WHITE PAPER: In this e-book, find suggestions for improving your enterprises' security posture, based on lessons learned from the cybersecurity trailblazers and executives interviewed for this report.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

VMware

3 Steps to Securing Enterprise Data on Cloud Platforms
sponsored by ReliaQuest
WHITE PAPER: Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

CW ASEAN: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

3 Tenets of Security Protection for State and Local Government and Education (SLED)
sponsored by Dell EMC
RESOURCE: Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Dell EMC

5 Signs of Malicious Activity Your Organization May Be Overlooking
sponsored by Farsight Security
RESOURCE: If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Farsight Security

Critical Steps to a More Secure Mobile Environment in 2019
sponsored by Vox Mobile Solutions
WHITE PAPER: In this check list, discover the 10 crucial steps to achieve a more secure mobile environment in 2019.
Posted: 02 Jul 2019 | Published: 02 Jul 2019

Vox Mobile Solutions

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Why Training Is Not Enough to Stop Phishing Emails
sponsored by Inky Technology
RESOURCE: According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Inky Technology

Acalvio Deception Intro Video
sponsored by Acalvio
WEBCAST: In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.
Posted: 27 Jun 2019 | Premiered: Jun 27, 2019

Acalvio

The State of Email Security Report 2019 Key Findings
sponsored by Mimecast
RESOURCE: 94% of organizations experienced a phishing attack in Mimecast's State of Email Security survey. In this infographic, explore more key finding from the study to gain a better understanding of organization's biggest email challenges.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Mimecast

Definitive Guide to Deception 2.0
sponsored by Acalvio
EBOOK: Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

Salesforce Data Protection Through User Activity Monitoring
sponsored by FairWarning
WHITE PAPER: Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

FairWarning

The Digital Workspace: 3 Elements of Success
sponsored by Citrix
WHITE PAPER: When it comes to managing the digital workspace, IT leaders overwhelmingly selected security as the top challenge. However, when managed properly, the right cloud-based digital workspace can keep organizations secure. In this white paper, learn how a unified Citrix experience can help organizations expand their security.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Citrix

10 Signs It's Time To Review Your Endpoint Protection
sponsored by Blackberry Cylance
RESOURCE: Cyber attacks are increasing in frequency, and effectiveness. The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended? In this infographic, explore 10 signs that will help you determine whether your endpoint security strategy needs to be updated.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Blackberry Cylance

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Citrix

Security Awareness Training Done Right
sponsored by Mimecast
PRODUCT OVERVIEW: Despite the most advanced protections that can be put in place, despite the best threat intelligence that can be brought, organizations remain vulnerable to attacks because of one key factor: human error. In this solution brief, learn how Mimecast Awareness Training can help organizations combat security breaches caused by employee mistakes.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Acalvio ShadowPlex Presentation
sponsored by Acalvio
WEBCAST: Acalvio ShadowPlex provides advanced threat detection capabilities using enterprise deception at the core of its solution. Watch this live demo of Acalvio ShadowPlex to learn more about the platform and how to use it.
Posted: 24 Jun 2019 | Premiered: Apr 29, 2019

Acalvio

3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

Threat Intelligence: Far-fetched Idea or Must-Have Security Tactic?
sponsored by Mimecast
WHITE PAPER: Whether you're a large enterprise or a lean one, threat intelligence is the responsibility of every CISO. Download this white paper to learn how you can make threat intelligence a priority in your cyber resilience planning today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process
sponsored by FairWarning
WHITE PAPER: Cloud solutions can reduce costs, but storing information in the cloud can present security risks. This doesn't mean organizations shouldn't use the cloud; however they should amp up their security to protect their data. This white paper will help you decide whether to build or buy cloud security software by determining your top priorities.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

FairWarning

APAC guide to plugging endpoint security gaps
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

ComputerWeekly.com

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT
176 - 200 of 2501 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement