IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
26 - 50 of 2648 Matches Previous Page  |  Next Page
Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Managing Customer & Partner Identities
sponsored by Okta
WHITE PAPER: As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Dutch organisations demand more from government
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

ComputerWeekly.com

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

How Connected are your Cyber Operations and Business Objectives?
sponsored by Optiv
RESOURCE: Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Identity Layer for Web and Mobile Applications
sponsored by Okta
DATA SHEET: This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

The New Era of Fraud: A Bot-Driven Threat
sponsored by F5 Networks
WHITE PAPER: With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

F5 Networks

Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach
sponsored by Optiv
CASE STUDY: In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Adding Advanced Capabilities into Today's SOC
sponsored by Optiv
ANALYST REPORT: View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

The Journey of Security in a DevOps Environment
sponsored by F5 Networks
WHITE PAPER: To address the increasing demand for application delivery, organizations are adopting DevSecOps: combining the efficiency of DevOps with modern security practices. But how can security be incorporated without disturbing the development process? In this article, uncover the benefits of incorporating security into your DevOps environment.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Ransomware Defense Checklist
sponsored by Cisco Umbrella
RESOURCE: The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Cisco Umbrella

NIST Maturity Report
sponsored by Optiv
RESOURCE: The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

The Next Wave of Bot-Driven Brute Force Attacks
sponsored by F5 Networks
EBOOK: With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Evolve your Security Operations Center
sponsored by Optiv
WEBCAST: Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019

Optiv
26 - 50 of 2648 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement