IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
76 - 100 of 2943 Matches Previous Page  |  Next Page
Apex One Datasheet
sponsored by Trend Micro
DATA SHEET: The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

Global Data at Risk: State of the Web Report
sponsored by Tala Security
WHITE PAPER: 2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

The 2020 State of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER: A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020

Palo Alto Networks

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

5 Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware
WHITE PAPER: Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.
Posted: 01 Sep 2020 | Published: 31 Mar 2020

VMware

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

IT And Security Silos: A Spotlight On The APAC Region
sponsored by VMware
WHITE PAPER: VMware commissioned Forrester Consulting to evaluate the relationship between IT and security teams. These two important organizational pieces tend to disagree with one another. Their leaders plan to consolidate the two, which brings both great challenges and great benefits. Read this report to learn why this is so crucial today.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

VMware

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Securing Branch Offices and Retail Stores in the Digital Age
sponsored by Palo Alto Networks
WHITE PAPER: The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Software-Defined Networks are Creating New Challenges for Enterprise Security
sponsored by Palo Alto Networks
ANALYST REPORT: A panel of 300 North American respondents was asked about how they use SD-WAN and what drives their security concerns in those deployments. What were the main drivers for adopting SD-WAN? What benefits have been recognized? How do they plan to consolidate functions with respect to SD-WAN? Read this report to get these answers and more.
Posted: 31 Aug 2020 | Published: 30 Jun 2020

Palo Alto Networks

Azure Essentials: Defense in depth security
sponsored by TechData - Microsoft
VIDEO: As cloud becomes more widely adopted, security across these expanding cloud environments needs to improve to keep pace with modern threats and operational requirements. Watch this video to learn more about Microsoft Azure’s cloud security, management and control capabilities, including how it leverages machine learning.
Posted: 31 Aug 2020 | Premiered: 12 Apr 2018

TechData - Microsoft

Measuring the ROI of Security Orchestration and Response Platforms
sponsored by Splunk
WHITE PAPER: Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Splunk

Secure Cloud Computing: Today's Biggest Roadblocks
sponsored by TierPoint MSFT
RESOURCE: Now that the COVID-19 pandemic has pushed most office workers to home-based computers outside of corporate firewalls, there’s more reason for hackers to target the cloud. This article explores today’s biggest cloud security risk areas and how to overcome them – read on to get started.
Posted: 31 Aug 2020 | Published: 19 May 2020

TierPoint MSFT

Credit Union Bolsters Security and Compliance Using Arctic Wolf
sponsored by Arctic Wolf Networks, Inc.
CASE STUDY: In this case study, discover why Valley Strong Credit Union partnered with Arctic Wolf in order to address growing operational challenges they were facing in regard to securing sensitive customer data with limited IT and cybersecurity resources.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

Tension between IT and Security Professionals Reinforces Silos and Security Strain
sponsored by VMware
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 31 Aug 2020 | Published: 31 May 2020

VMware

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

Customer Case Bergman Clinics
sponsored by Zivver
CASE STUDY: In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Zivver

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

5 Must-Haves to Look for in a Best-in-Class IoT Security Solution
sponsored by Palo Alto Networks
WHITE PAPER: Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Security Orchestration For Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks
76 - 100 of 2943 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info