IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
201 - 225 of 2595 Matches Previous Page  |  Next Page
Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

How to Up Level your Defenses with Security Analytics
sponsored by Splunk
WHITE PAPER: If you don't have actionable insights to detect and respond to emerging and current threats, you're not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Q2, 2019 Cyberthreats & Trends Report
sponsored by Neustar
ANALYST REPORT: While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.
Posted: 19 Aug 2019 | Published: 12 Aug 2019

Neustar

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019

Proofpoint

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.

The SIEM's Buyers Guide for 2020
sponsored by Splunk
WHITE PAPER: In short, a SIEM is a security platform that ingests event logs and offers a single view of this data with additional insights—but as with all growing tech offerings right now, its current capabilities may be far more than you are aware. Read this white paper to learn about the evolution of SIEM, and 9 technical capabilities of a modern SIEM.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Splunk

Fortinet SD-Branch Secures the Network Edge at the Branch
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

State of Operational Technology and Cybersecurity Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.
Posted: 14 Aug 2019 | Published: 15 Mar 2019

Fortinet, Inc.

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Fortinet Private Cloud Security Solutions: Use Cases for Comprehensive Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations that invest in hybrid cloud infrastructures often realize significant business value, however; private clouds bring their own unique security challenges. In this white paper, explore 5 key uses cases for private cloud security and discover the benefits of Fortinet's private cloud security solution.
Posted: 13 Aug 2019 | Published: 02 Apr 2019

Fortinet, Inc.

CISO and Cybersecurity: A Report on Current Priorities and Challenges
sponsored by Fortinet, Inc.
ANALYST REPORT: The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.
Posted: 13 Aug 2019 | Published: 27 Jul 2019

Fortinet, Inc.

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

Security Gets Smart with AI
sponsored by Blackberry Cylance
ANALYST REPORT: In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.
Posted: 09 Aug 2019 | Published: 31 Mar 2019

Blackberry Cylance

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Top Research For CIOs: Security
sponsored by MASERGY
ANALYST REPORT: Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
Posted: 09 Aug 2019 | Published: 15 Mar 2019

MASERGY

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems
201 - 225 of 2595 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement