IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
76 - 100 of 3547 Matches Previous Page  |  Next Page
Email+ Enhances PIM Security and Preserves the Native App Experience
sponsored by MobileIron
RESOURCE: Personal information management (PIM) apps are some of the most commonly used apps in the enterprise. But, how can you enhance the security of PIM apps without degrading the native app experience? Download this resource to find out.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

Protect your Data in the Cloud
sponsored by Dell EMC and Intel®
VIDEO: Learn about Dell EMC's Integrated Data Protection Appliance, a cloud enabled protection storage product that protects physical and virtual workloads.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

Dell EMC and Intel®

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Machine Learning Use Cases in Financial Crimes
sponsored by SAS
WHITE PAPER: Learn about 10 practical and achievable ways to put machine learning to work and ensure fraud detection efficiency.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Securing the Future: How to Keep IoT Deployments Safe
sponsored by Aeris
RESOURCE: Gain control of your IoT security risks by learning 4 common best practices.
Posted: 02 Nov 2018 | Published: 31 Dec 2017

Aeris

How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

AlienVault

Build a Strategic Approach to Network and App Security
sponsored by Citrix
RESOURCE: Learn how your organization can securely deliver the apps and data your teams need to be productive.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Citrix

Beginner's Guide to AWS Security Monitoring
sponsored by AlienVault
RESOURCE: Download this guide to bolster your approach to AWS security monitoring and learn the biggest 3 concerns in cloud security.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

AlienVault

Enterprise Risk Mitigation for Community Banks
sponsored by SAS
WHITE PAPER: Keeping pace with anti-fraud and anti-money laundering (AML) regulations represents a significant burden for financial institutions, particularly smaller ones. Download this white paper to learn more about the challenges these regulations pose and how to meet them.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Detecting and Preventing Banking Application Fraud
sponsored by SAS
RESOURCE: Preventing application fraud starts with validating the identity of an individual using a digital device. Are they really who they say they are? Download this white paper for analytics-driven methods for validating financial services applications and spotting trouble at all three stages of bust-out fraud schemes.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO: Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

9 Misconceptions About Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: Download this resource for 9 dangerous misconceptions about third-party risk management that you need to know.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Protecting Against Third-Party Breaches Requires Continuous Monitoring
sponsored by BitSight
RESOURCE: With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Protect Hybrid Workloads from Cyberattack: Advance to Secure Servers
sponsored by Logicalis
WHITE PAPER: Download this white paper to learn about an approach to protecting hybrid workloads from cyberattacks that utilizes a server specifically designed to protect against malicious threats that target firmware.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Logicalis

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Dell SecureWorks

A New SIEM for a New World
sponsored by Empow Cyber Security
VIDEO: Don't get overwhelmed by the onrush of cybersecurity data – protect your organization by leveraging a modern SIEM that uses AI-powered analytics and automation to process that large volume of data and turn it to your advantage.
Posted: 31 Oct 2018 | Premiered: 25 Oct 2018

Empow Cyber Security

Beat the Top 3 Security Challenges in Office 365
sponsored by Proofpoint, Inc.
VIDEO: Compromised accounts can be used to launch attacks or access sensitive data in the cloud. This is why organizations are taking security measures to defend your cloud collaboration tools against cybercriminals, especially in Office 365 applications. Download this webcast to learn how you can overcome these security challenges, today.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Is Your Growing Business Properly Securing Its Data?
sponsored by Evident
WHITE PAPER: Download this resource to learn the 3 steps you can take to implement a scalable security structure, and embrace flexible data management and verification processes to avoid a costly data breach as your business grows.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Evident

How MIT takes on Cybersecurity – A Bloomberg Radio Interview
sponsored by Empow Cyber Security
PODCAST: How does the MIT Media Lab protect its ideas of the future from cybercrime? Find out in this exclusive interview with MIT's Media Lab Director, Michail Bletsas.
Posted: 30 Oct 2018 | Premiered: Oct 30, 2018

Empow Cyber Security

4 Steps for Robust Data Protection and Compliance
sponsored by Egnyte
RESOURCE: Learn how Egnyte Protect can tell you where your sensitive data is located, who has access, how it is being shared, what vulnerabilities are in your environment, and more. Plus, discover 4 steps for robust data protection and compliance.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Egnyte

Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem
sponsored by CyberGRX
VIDEO: Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.
Posted: 30 Oct 2018 | Premiered: 30 Oct 2018

CyberGRX

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Dell SecureWorks

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
EBOOK: Employee behavior and the culture you influence greatly impact the effectiveness of your overall cyber resilience strategy. Read on for 6 ways you can make security awareness apart of your organization's culture.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

Mimecast
76 - 100 of 3547 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement