IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
51 - 75 of 2435 Matches Previous Page  |  Next Page
Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Orion Health Automates Security on AWS and Gains Centralized Management
sponsored by Trend Micro, Inc.
CASE STUDY: Orion Health embarked on a journey to build a SOC to support the deployment of Amadeus on AWS. They wanted everything on AWS to be automated. Having consistent, automated policies and processes would help to ensure that their customers' data was protected. In this case study, learn about Orion Health's experience using Trend Micro's Deep Security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

10 Must Knows For Architecting Your Multi-Cloud Security Strategy
sponsored by Trend Micro, Inc.
WHITE PAPER: Security should be an integral part of your cloud strategy. Designing and implementing security controls for your public cloud environment, requires a thorough understanding of the division of responsibilities between the cloud service provider and you as a customer. In this white paper, explore 10 things you should know about multi-cloud security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

Evaluating Vulnerability Assessment Solutions
sponsored by Rapid7
WHITE PAPER: Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Rapid7

SOAR Buyer's Guide
sponsored by D3 Security
WHITE PAPER: Orchestration and automation have nearly limitless benefits for your security operations, but you first need to have a solid foundation. In this white paper, explore 3 questions you and your team should answer before you begin to evaluate a SOAR platform.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

Redefining Security Orchestration, Automation & Response with the MITRE ATT&CK Framework
sponsored by D3 Security
WHITE PAPER: SOAR platforms are broadly effective at the linear process of in-taking events and orchestrating response actions. However, they vary in their ability to support larger investigations that identify the scope of an incident. In this white paper, learn more about SOAR platforms including key differences between event-based and intent-based response.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

Top 3 Causes of Endpoint Security Failure
sponsored by Comodo
RESOURCE: Endpoint security has been radically redefined in recent years making it essential that organizations rethink and rearchitect how they prevent cybercriminals. This paper looks at 3 major reasons for endpoint security failure, why solving the problem is becoming more difficult and where to look for endpoint security platforms.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Comodo

Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.
Posted: 02 Apr 2019 | Published: 30 Apr 2018

Trend Micro, Inc.

Market Guide for Cloud Workload Protection Platforms: Assessment
sponsored by Trend Micro, Inc.
RESOURCE: With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Trend Micro, Inc.

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

Securing Big Data Analytics
sponsored by comForte AG
WHITE PAPER: Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG

The Market of Data Loss Prevention
sponsored by Forcepoint
RESEARCH CONTENT: This research report provides an analysis of the market for data loss prevention, revealing top players, trail blazers, specials and mature players. Data loss prevention solutions provide electronic data supervision and management to help organizations prevent non-compliant information sharing. In this research report, explore key vendors.
Posted: 01 Apr 2019 | Published: 31 Oct 2018

Forcepoint

Financial Services, Fraud and the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Onfido

Endpoint Protection Buyer Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

How to Get Started with the NIST Cybersecurity Framework
sponsored by Expel
WHITE PAPER: The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

A Common Sense Approach for Assessing Third-Party Risk
sponsored by Expel
WHITE PAPER: Supply chain partners can be a weak link when it comes to security. Third-party assessments are a great way to manage that risk. But they can quickly become burdensome and create mountains of paperwork without necessarily improving security. In this white paper, explore Expel's 6-step third-party assessment process.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

SOAR-Native SOC
sponsored by D3 Security
WHITE PAPER: If you already have some detection tools and ad hoc processes, and are transforming those elements into a formal SOC, now is an optimal time to learn how to leverage a SOAR platform's capabilities. In this white paper, explore the benefits of implementing a SOAR platform into your SOC.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

D3 Security

How Much Does it Cost to Build a 24x7 SOC?
sponsored by Expel
WHITE PAPER: To say SOCs are costly is an understatement—they can range anywhere from $10,000 to more than $10 million. Download this white paper to review 4 SOC options and costs associated with them, as well as what they can do for your organization.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Expel

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by comForte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Mercury Processing Services International Secures Growth
sponsored by comForte AG
CASE STUDY: Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Regulation, Innovation and Financial Services
sponsored by Onfido
VIDEO: Thanks to a recent spate of data breaches, SSNs and other traditional identifiers are no longer fit for purpose. But without identity verification, new customers can't be on boarded. Tune into this webinar to learn why passive data proofing is no longer enough – and which authentication approaches to avoid.
Posted: 29 Mar 2019 | Premiered: 29 Mar 2019

Onfido

Rethinking Data Security With a Risk-Adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 29 Mar 2019 | Published: 26 Apr 2018

Forcepoint

AXCESS Financial Finds & Stops Fraud with Interaction Analytics
sponsored by CallMiner
CASE STUDY: AXCESS Financial needed a way to solve their fraud problem. In order to do this they deployed CallMiner Eureka Interaction Analytics which helped them to identify fraudsters. In this case study, learn more about how AXCESS Financial turned insight into prevention using CallMiner Eureka.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CallMiner

The Transparent Managed Security Handbook
sponsored by Expel
EBOOK: Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.
Posted: 28 Mar 2019 | Published: 28 Mar 2019

Expel

Don't Let Security Concerns Stop You From Embracing Mobility
sponsored by Samsung Electronics
RESOURCE: How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.
Posted: 27 Mar 2019 | Published: 16 Nov 2018

Samsung Electronics
51 - 75 of 2435 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement