IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
176 - 200 of 2426 Matches Previous Page  |  Next Page
Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo and Intel
RESOURCE: Perhaps the single most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes can help protect your organization.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo and Intel

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

How to Align with the NIST Cybersecurity Framework
sponsored by Forescout
EBOOK: Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by Forescout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

The Managed Print Services Market
sponsored by Kyocera Document Solutions UK
RESOURCE: Security is a major concern for financial organizations due to the volume of sensitive personal data flowing in and out on a daily basis. It is essential for financial organizations to evaluate their print security. In this article, learn more about why security matters in the managed print services market, especially in the financial sector.
Posted: 20 Mar 2019 | Published: 06 Jul 2018

Kyocera Document Solutions UK

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk Services UK Ltd
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk Services UK Ltd

Complying with CECL
sponsored by SAS
WHITE PAPER: The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.
Posted: 19 Mar 2019 | Published: 26 Apr 2018

SAS

Data Protection is a Business Challenge
sponsored by Veritas
RESOURCE: Outages and data losses can have terrible business consequences. They are not simply short-time events; they cause significant, lasting disruptions. Direct loss of revenue is just the beginning of the potential negative outcomes from outages and data loss. In this infographic, learn about the data protection challenges that organizations face.
Posted: 19 Mar 2019 | Published: 31 Dec 2018

Veritas

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Managed Security Service Providers for Dummies
sponsored by Rackspace VMware
WHITE PAPER: One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. In Managed Security Service Providers for Dummies, learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

Rackspace VMware

Security Analytics Platforms, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.
Posted: 15 Mar 2019 | Published: 21 Sep 2018

LogRhythm, Inc.

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Why Differential Privacy Should Be Top of Mind for Data Science and Governance Teams
sponsored by Immuta, Inc
WHITE PAPER: Download this white paper to find out why differential privacy should be top of mind for data science and governance teams and uncover the 2 common approaches when it comes to differential privacy.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Immuta, Inc

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose
sponsored by MASERGY
WHITE PAPER: The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

MASERGY

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

Anatomy of a Cloud-Native Data Breach
sponsored by Radware
WHITE PAPER: Learn about a real-world cloud data breach, how it could have been avoided, lessons learned from it, and how a cloud workload protection service could have helped.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Radware

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Securing Dynamic Networks
sponsored by BT
WHITE PAPER: Networks are changing as new 'internet native' applications and services drive demand for more bandwidth, performance and flexibility. This paper provides a summary of the key security considerations in the hybrid network landscape, as well as some suggestions as to how the challenges can be overcome.
Posted: 07 Mar 2019 | Published: 28 Feb 2019

BT
176 - 200 of 2426 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement