IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
51 - 75 of 2513 Matches Previous Page  |  Next Page
Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Webinar: Pages from the Playbook – Building the MITRE ATT&CK™ Framework into your Incident Response
sponsored by IBM
WEBCAST: In this session, Craig Roberts, Solutions Architect at IBM Security, will explain Resilient's approach to ATT&CK and demonstrate how it can be used to investigate and remediate a security incident in coordination with QRadar, the Hybrid Analysis sandbox from CrowdStrike and the MISP threat intelligence platform.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

IBM

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Manufacturing Solution Brief
sponsored by enSilo
PRODUCT OVERVIEW: The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Small Organizations Still Need Big Security
sponsored by Blackberry Cylance
WHITE PAPER: Damage to a company's reputation is a major concern, so all companies, large and small, seek brand protection in every medium. Where small and large enterprises diverge is in resources to combat these threats. In this white paper, learn about cybersecurity strategies that small business can implement to help secure their organization.
Posted: 20 Sep 2019 | Published: 31 Jul 2019

Blackberry Cylance

Artificial Intelligence: The Smarter Approach To Information Security
sponsored by Blackberry Cylance
WHITE PAPER: The news headlines are replete with stories of devastating data breaches, compromising the data of millions. Traditional AV solutions are ineffective at preventing breaches. In this white paper, learn how an AI-driven security solution can help your organization combat cyber attacks.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Blackberry Cylance

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

On the Radar: IBM Resilient Applies Incident Response Orchestration to GDPR Data Breaches
sponsored by IBM
ANALYST REPORT: Download Ovum's On the Radar Report to learn how the IBM Resilient SOAR Platform simplifies breach notification by using built-in guidance and templates to track breach management and reporting tasks, privacy-focused assessment to help determine who to notify, and regularly updated breach notification requirements.
Posted: 20 Sep 2019 | Published: 24 Oct 2018

IBM

SSL Attacks on the Rise
sponsored by Radware
WHITE PAPER: As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Radware

Security Visibility for Cloud Environments: Webinar
sponsored by CloudPassage
WEBCAST: In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.
Posted: 19 Sep 2019 | Premiered: Sep 19, 2019

CloudPassage

CenturyLink 2019 Threat Report
sponsored by CenturyLink
ANALYST REPORT: Organizations will continue to accelerate the deployment of new technologies and capabilities that drive network traffic and security complexity. In the CenturyLink 2019 Threat Report, explore the role of deep network-based threat intelligence and discover the latest risks and attacks including botnets, DNS attacks, and more.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

CenturyLink

Ransomware Prevention i s Possible
sponsored by Blackberry Cylance
WHITE PAPER: All it takes is a couple clicks for ransomware to infect your entire network, encrypting every file, every drive, every server it can gain access to, and within minutes, your organization's most important data is locked. In this white paper, learn how preventing ransomware is possible.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Blackberry Cylance

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

IBM

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

Phoenix Children's Takes on Cybersecurity
sponsored by Blackberry Cylance
CASE STUDY: In this case study, learn how Phoenix Children's Hospital used CylancePROTECT to help protect against attackers hacking into patient data and disrupting hospital operations.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance

2019 State of OT/ICS Cybersecurity Survey
sponsored by Nozomi Networks
WHITE PAPER: In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.
Posted: 18 Sep 2019 | Published: 12 Jun 2019

Nozomi Networks

BlackBerry Cylance Cybersecurity Maturity Evaluation Guide
sponsored by Blackberry Cylance
EGUIDE: In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance

Vermont Electric Case Study
sponsored by Nozomi Networks
CASE STUDY: Watch this short video about Vermont Electric Cooperative Inc., as Chris Smith discusses the challenges of robust cybersecurity and how he overcame these challenges.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Nozomi Networks

Smart Branch Connectivity and Security Done Simply
sponsored by Verizon
RESOURCE: In this solution brief, discover how Verizon Software Defined Secure Branch can help you digitize your business with a secure, reliable and flexible network.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Verizon

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

VMware Service-Defined Firewall
sponsored by VMware
PRODUCT OVERVIEW: As business applications change from a traditional framework to a distributed architecture, it's increasingly difficult to keep attackers out of the internal network perimeter. In this brief, learn how the VMware Service-Defined Firewall is designed specifically to mitigate threats inside a data center or cloud network.
Posted: 17 Sep 2019 | Published: 17 Sep 2019

VMware
51 - 75 of 2513 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement