IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
51 - 75 of 2410 Matches Previous Page  |  Next Page
Securing Innovation
sponsored by Micro Focus
WHITE PAPER: Businesses must adopt new technologies, innovate with new products, and find new partners to expand their business. But, all of these activities increase security risk. If these risks are not addressed, they can cause damage to the company. In this white paper, learn how Micro Focus security tools can help secure your data.
Posted: 05 Feb 2019 | Published: 31 Jul 2018

TOPICS: 
Micro Focus

Endpoint Security: 7 Things you Should Pay Attention to Now
sponsored by Freudenberg IT
WHITE PAPER: Outdated browsers, network protocol vulnerabilities, untrained users – these days, malware has lots of entry points. While hackers are becoming more professional, most companies are inadequately positioned when it comes to device security. In this white paper, learn 7 things you should pay attention to in order to secure your organization.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Freudenberg IT

Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER: Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Dell SecureWorks

Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Forcepoint

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

2017 Global EDR Research & Market Leadership Award
sponsored by Tanium
WHITE PAPER: The challenge for endpoint security professionals is to keep pace with the changing tactics of hackers. Ultimately, an endpoint security vendor needs to be adaptable. In this white paper, learn about how Tanium achieved a leadership position in the Endpoint Detect and Response Stand Alone market, according to Frost & Sullivan.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

Missing Critical Patches: A Cybersecurity Epidemic
sponsored by Tanium
WHITE PAPER: IT security leaders agree that following best practices is instrumental in reducing cyber incidents. However, most organizations need to improve their best practices to stay secure. In this white paper, review key findings from a Frost & Sullivan survey. Also discover 5 recommended action items to help address common endpoint security issues.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

Today's State of Vulnerability Response: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

TOPICS: 
ServiceNow

Power of the Threat Detection Trinity
sponsored by Micro Focus
WHITE PAPER: Today, SOCs face mounting challenges as the advanced threat landscape continues to evolve. Compounding the challenge of advanced threats is the explosion of data and lack of skilled security personnel. In this white paper, learn how you can best combine real-time correlation, insider threat analysis and hunting to protect against cyberthreats.
Posted: 04 Feb 2019 | Published: 31 Jan 2019

TOPICS: 
Micro Focus

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Dell SecureWorks

Aligning GDPR Requirements with Today's Hybrid Cloud Realities
sponsored by DataStax
WHITE PAPER: As high-profile companies start getting hit with GDPR fines, it is important to continuously ensure your organization remains compliant. As your organizations' IT environment becomes increasingly hybrid in nature, GDPR should be reevaluated. In this white paper, learn more about key capabilities in enabling GDPR compliance in hybrid environments.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

TOPICS: 
DataStax

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

The IT Security Confidant: Mobile Security
sponsored by Symantec
VIDEO: In this video, learn about Comprehensive Mobile Endpoint Protection and learn how you can fight off the latest mobile threats without slowing down your devices.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

Symantec Web Security Service Advanced Cloud-Delivered Network Security for the Cloud Generation
sponsored by Symantec
WHITE PAPER: Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Symantec Secures Rockwell Automation Industrial Control and Business Intelligence Solutions
sponsored by Symantec
CASE STUDY: Industrial control systems have become a major focus for attacks and are now among the top targeted sectors. To help address the risk to computer-based endpoints in automation systems, Rockwell Automation partnered with Symantec Corporation to provide endpoint level security. Download this case study to learn more about the partnership.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Ceragon Networks Embraces BYOD with Symantec Endpoint Protection Mobile
sponsored by Symantec
CASE STUDY: As mobile and BYOD usage escalated at Ceragon Networks, they realized that mobile device management was not a complete mobile security solution. In order to secure their mobile security, they needed something more active. Download this case study to see the many benefits Ceragon Networks saw when deploying Symantec Endpoint Protection Mobile.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Western Union Rolls Out Symantec to Help Protect Mobile Devices
sponsored by Symantec
CASE STUDY: With the importance of mobile devices, Western Union needed robust tools to help protect them across multiple threat vectors. In this case study, learn about how Western Union implemented Symantec solutions to secure mobile devices without impacting the end user experience.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Pickup
sponsored by Symantec
VIDEO: Download this video to see the benefits of Symantec Endpoint Protection Mobile.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

Predictive Mobile Threat Defense
sponsored by Symantec
WHITE PAPER: Download this white paper to learn how you can take your enterprise mobility strategy to the next level with a modern mobile security program that provides pre-emptive threat defense and runs on predictive intelligence and crowd wisdom.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Securing Application by Default
sponsored by Tech Data - Vmware
PRODUCT OVERVIEW: When the attack surface remains so large, there are simply too many ways for a threat to compromise an application for point solutions to cover them all. In this overview, learn about a product that can deliver comprehensive application visibility, consistent control points, default security through automation, and more.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tech Data - Vmware

Real-World Customers with Secure Application Infrastructure
sponsored by Tech Data - Vmware
WHITE PAPER: In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tech Data - Vmware

Change Healthcare
sponsored by Micro Focus
CASE STUDY: Applications developed by Change Healthcare are used to process millions of healthcare transactions. Therefore, it is essential for the organization to ensure all data is secure. In this case study, learn how Fortify on Demand and Micro Focus Fortify WebInspect provided an affordable and effective means of finding and fixing vulnerabilities.
Posted: 30 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

The Mobile Security Confidant
sponsored by Symantec
WEBCAST: Watch this brief video to learn about a comprehensive endpoint protection platform that's deployable in minutes, manageable from anywhere, and won't slow users' devices.
Posted: 30 Jan 2019 | Premiered: Jan 30, 2019

TOPICS: 
Symantec

Three Secrets to Becoming a Mobile Security Superhero
sponsored by Symantec
WHITE PAPER: Download this resource to learn how supplementing your EMM and MDM strategies with a comprehensive mobile threat defense program can protect your organization's mobile devices at every level.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Symantec
51 - 75 of 2410 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement