IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
76 - 100 of 2435 Matches Previous Page  |  Next Page
Enterprise Tokenization with SecurDPS
sponsored by comForte AG
WHITE PAPER: Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Detect and Prevent Fraud Before Claims are Paid
sponsored by SAS
WHITE PAPER: Fraud losses represent an increasingly complex and systemic risk that's affecting the profitability of every insurance company. In this white paper, learn how SAS takes an enterprise approach to fraud detection and prevention by delivering software either on-site or via the cloud.
Posted: 27 Mar 2019 | Published: 30 Sep 2018

SAS

Cloud Security: Don't Go Blind While Playing in the Cloud
sponsored by Ziften
WEBCAST: Clouds are an intense security target because of their concentration of information. Why would hackers target multiple different companies when they can go to the cloud data center and see the same target opportunity? In this webcast, listen as Dr. Al Hartmann and Michael Levin discuss 6 security tips for moving enterprise apps to the cloud.
Posted: 27 Mar 2019 | Premiered: Mar 27, 2019

Ziften

The Business Case for Identity and Data Management
sponsored by Optiv
WHITE PAPER: In today's world, traditional methods of enterprise security are challenged on a daily basis. At the center of these challenges are compromised identities. Quite simply, identities are the gateway to data. In this white paper, discover several things you should consider before investing in an identity and data management (IDM) program.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Optiv

Fighting Fraud - the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Onfido

Securing Your Business Amid Cloud Migration
sponsored by British Telecommunications PLC
RESOURCE: Learn about a new way to tackle cybercriminals in this resource, and find out how you can stay protected when completing your move to the cloud.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

British Telecommunications PLC

5 Steps for a Successful IDM Deployment
sponsored by Optiv
WHITE PAPER: Identity and Data Management (IDM) is a complex and ever-shifting aspect of every organization's IT structure. It's no surprise, then, that IDM is essential yet challenging, involving policy design, role-mapping and identity and data controls. In this white paper, discover 5 steps for a successful IDM deployment.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

Identity and Data Management: The Strategic Imperative
sponsored by Optiv
WHITE PAPER: In the era of digital transformation, identity and data management (IDM) is essential to strategic security programs to protect and control continuously shifting assets needed in business enablement initiatives. In this white paper, explore key elements that Optiv recommends organizations include in their strategic IDM program.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

The SOAR Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Splunk Services UK Ltd

Cloud Visibility and Security for DevOps & SecOps Teams
sponsored by Ziften
WHITE PAPER: Moving a business-critical server or application to the cloud is not foolproof. System outages, data loss and more can, and do, occur due to misconfigurations, system failures, or security exploits. In this white paper, explore 6 common cloud visibility use cases encountered by DevOps and SecOps personnel on a regular basis.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Ziften

What Worries Enterprise CISOs When Migrating to the Cloud
sponsored by Ziften
RESOURCE: Migrating to the cloud offers a number of advantages to enterprise organizations that CISOs really like, but there are real security issues that make switching over to a cloud environment worrisome. In this article, learn why it is essential to have security and visibility within your cloud environment.
Posted: 26 Mar 2019 | Published: 18 Feb 2019

Ziften

MFP Security Guide
sponsored by Kyocera Document Solutions UK
WHITE PAPER: Multi-function printers (MFPs) have become a cybersecurity blind spot within many organizations. This white paper offers practical guidance for IT professionals to harness the built-in security features of leading MFPs and adopt further, enhanced data protection capabilities. Read on to learn more.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Kyocera Document Solutions UK

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Identity and Data Management
sponsored by Optiv
RESOURCE: Breaches, compliance and digital transformation are 3 challenges organizations today are faced with. Another issue at the center of today's challenges is compromised identities. In this resource, learn why your organization needs a strategic approach to identity and data management. Also learn how Optiv can help your organization do this.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Optiv

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

The Benefits of Network Visibility for Industrial Automation
sponsored by Forescout
WHITE PAPER: Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by Forescout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Evolving Security Drivers in the UK Public Sector
sponsored by Kyocera Document Solutions UK
RESOURCE: There is an increased appetite for more secure print and document management processes. Even public sector organizations with a good grasp of the security challenges facing their print estates have a hard time knowing how secure each device is. In this article, learn how KYOCERA's Secure MFP can help mitigate the risks of threats and attacks.
Posted: 21 Mar 2019 | Published: 06 Apr 2018

Kyocera Document Solutions UK

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

IT Security New Analytics-Driven Model
sponsored by Splunk
RESEARCH CONTENT: Enterprises today must protect not only their own data, systems, and intellectual property, but also content shared by third-parties. Lapses can be very disruptive to an organization. In this research report, explore key findings from a survey on cybersecurity practices. Also explore tips for building a strong cybersecurity program.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd
76 - 100 of 2435 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement