IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
26 - 50 of 3552 Matches Previous Page  |  Next Page
Quarterly Threat Report - Q3
sponsored by Rapid7
RESOURCE: Learn how cyber incidents and threats have evolved over the past year in this quarterly report.
Posted: 28 Nov 2018 | Published: 13 Nov 2018

Rapid7

Armor Anywhere: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn how your organization can adopt a managed security service that fortifies and unifies your on-premise, cloud and hybrid IT security defenses to enable you to prevent, detect and respond to cyberthreats in real-time.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor

Armor Monitored WAF
sponsored by Armor
RESOURCE: Learn how this Web Application Firewall (WAF) can help stop OWASP's Top Ten applications attacks including SQL injections, XML External Entity (XXE) attacks, and cross-site scripting (XSS) attacks.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

Armor

Cloud Security: Taking the Fear out of Cloud Security
sponsored by UKFast
RESOURCE: Explore 5 cloud security takeaways and a best practice checklist to help you pick the right cloud provider for your business.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

UKFast

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

10 Must Ask Questions When Choosing a SOAR Solution
sponsored by Siemplify
RESOURCE: Now that there are many security orchestration, automation, and response (SOAR) platforms in the market, how do you chose the right one? Download this resource for 10 important questions to ask before choosing a SOAR platform, today.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

Siemplify

Closing the Cybersecurity Gap
sponsored by Splunk
RESEARCH CONTENT: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Exploring the Past, Present, and Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Download this report for an overview of blockchain's origins, its evolution to Blockchain 2.0, attraction for cryptopirates, and potential to expand into more legitimate industries.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Organizations React to Security Threats More Efficiently and Cost Effectively
sponsored by Recorded Future
WHITE PAPER: While organizations may install security tools that integrate data feeds onto their network, many do not recognize what to do with the information that is coming in. In this IDC white paper, uncover the findings from interviews with 6 organizations regarding the impact of deploying a universal threat intelligence solution.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Recorded Future

You've Been Breached- Now What?
sponsored by CrowdStrike
WHITE PAPER: Learn how to respond to a worst-case cyberattack scenario, actions you can take immediately after an attack, and the long-term planning to stop the next one.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

CrowdStrike

Continuous Delivery of Business Value with Micro Focus Fortify
sponsored by Micro Focus
WHITE PAPER: Download this report to reveal how this software security system is changing the game for development and security teams at leading companies.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

A Guide to Protecting Microsoft Office 365 from Security Threats
sponsored by Symantec
WHITE PAPER: Explore how Symantec is helping businesses achieve their O365 migration goals through a set of security and information compliance controls that protect Office 365.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Symantec

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

HP Secure Print Analysis: Are your Printers Easy Prey?
sponsored by HP
RESOURCE: How secure are your printers? Get your rating and a personalized checklist.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

IDC Government Procurement Device Security Index 2018
sponsored by HP
RESOURCE: Download the IDC Government Procurement Device Security Index 2018 to explore a study on the consideration given to security requirements in public sector procurement of PCs and printers (and print services). Discover the results IDC found and find out the implications of security in procurement.
Posted: 15 Nov 2018 | Published: 31 May 2018

HP

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Employing Machine Learning in Security and UEBA: A Data-Science Driven Approach
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how machine learning can enable your team and technology to be better, smarter, and faster by having advanced analytics at its fingertips to solve real problems – like detecting User and Entity Behavior Analytics threats – quickly.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

The Elevation of Security
sponsored by HP
EBOOK: We live in the era of digital disruption, when always-on connectivity, a mobile workforce and globalization leave us more vulnerable than ever to cybersecurity assaults. Access this 28-page e-book to grasp a better understanding of how to detect and prevent security attacks in this changing world.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

Cloud Security: Are You Ready?
sponsored by Symantec
RESOURCE: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Symantec

Securing the Internet of Things
sponsored by TATA Communications
RESOURCE: Learn about the specifics of securing cellular IoT based services and the 4 layers of protection that are imperative to your IoT security strategy.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

TATA Communications
26 - 50 of 3552 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement