IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
176 - 200 of 2641 Matches Previous Page  |  Next Page
The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Morphisec 2019 Hospitality Guest Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Morphisec, Inc.

RMM & Patch Management: The First Line of Defense Against Cyber Threats
sponsored by Datto, Inc.
WHITE PAPER: Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Cybercrime The New Downtime Threat to SMBs
sponsored by Avast Software
RESOURCE: A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avast Software

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Human Factor Report 2019
sponsored by Proofpoint
ANALYST REPORT: Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.
Posted: 09 Oct 2019 | Published: 12 Mar 2019

Proofpoint

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Privileged Access Management as a Service: What's in it for You?
sponsored by CyberArk Software, Inc
WEBCAST: In this webcast, learn how privileged access management as a service benefits your organization to help you stay secure.
Posted: 08 Oct 2019 | Premiered: Oct 8, 2019

CyberArk Software, Inc

Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

The Madness of IT Security Sprawl
sponsored by PortSys
RESOURCE: Does adding more complexity to your IT infrastructure make you safer? Many organizations believe the more security solutions, the better. In this article, learn why that is not the case and why there needs to be a stop to “The Madness of IT Security Sprawl” today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

How Machine Learning Can Help You Keep up with Current Threats
sponsored by Dell SecureWorks
EGUIDE: Although organizations are spending billions of dollars on cybersecurity products, cyberattacks are continuing to be successful. This means that their tools need to be updated. In this e-guide, learn how AI and ML can help to improve your cybersecurity tools and processes.
Posted: 30 Sep 2019 | Published: 25 Sep 2019

Dell SecureWorks

Enel Case Study: Securing Global Power Generation Network
sponsored by Nozomi Networks
CASE STUDY: Electric energy operators are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company. In this case study, learn how Enel was able to monitor, troubleshoot, and protect its industrial control network from a central location with the help of Nozomi Networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Nozomi Networks

API Security: What You Need to Do to Protect Your APIs
sponsored by Data Theorem
ANALYST REPORT: Despite growing awareness of API security, breaches continue to occur. API management and web application firewall vendors are addressing the problem. But, application leaders must design and execute an effective API security strategy to protect their APIs. In this Gartner report, discover recommendations for developing an API security strategy.
Posted: 27 Sep 2019 | Published: 28 Aug 2019

Data Theorem

Supporting NERC CIP Compliance
sponsored by Claroty
WHITE PAPER: Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

Computer Weekly – 1 October 2019: The most influential women in UK technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
Posted: 27 Sep 2019 | Published: 01 Oct 2019

ComputerWeekly.com

Introduction to Claroty
sponsored by Claroty
WEBCAST: In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.
Posted: 27 Sep 2019 | Premiered: Sep 27, 2019

Claroty

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Claroty A New Platform For OT Cybersecurity
sponsored by Claroty
PRODUCT OVERVIEW: Ensuring the security of industrial control systems (ICS) and the prevention or detection of cyberattacks and events is of increasing importance to users of these systems. In this white paper, learn about the Claroty platform which represents an innovative approach to addressing the specific challenges associated with cybersecurity in ICS.
Posted: 26 Sep 2019 | Published: 30 Sep 2016

Claroty
176 - 200 of 2641 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement