IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
76 - 100 of 2410 Matches Previous Page  |  Next Page
Security with Dropbox Business
sponsored by Dropbox
WHITE PAPER: User-friendly tools provide IT with a unique opportunity to centralize data onto a sanctioned platform. Dropbox has approached this by becoming a popular tool for productivity. In this white paper, learn how they pair the benefits of widespread adoption with the controls and certifications IT needs to protect employees and their data.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Dropbox

Best Practices for Implementing Security Awareness Training
sponsored by Mimecast
WHITE PAPER: While technology-based solutions are critical for protecting an organization from attacks, a robust security awareness training program is also essential to provide a backstop. In this white paper, learn about the current state of security awareness training. Also learn about best practices to consider when developing a robust training program.
Posted: 30 Jan 2019 | Published: 31 Oct 2018

TOPICS: 
Mimecast

Data Protection and PCI Scope Reduction for Today's Businesses
sponsored by Micro Focus
WHITE PAPER: Tokenization is a method of data protection and audit scope reduction recommended by the PCI DSS Security Standards Council. However, merchants and service providers who have implemented it have encountered problems. In this white paper, learn about the SecureData platform with Secure Stateless Tokenization.
Posted: 30 Jan 2019 | Published: 30 Jun 2018

TOPICS: 
Micro Focus

Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Trend Micro, Inc.

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

How Tanium Addresses the NIST Cybersecurity Framework
sponsored by Tanium
RESOURCE: Download this checklist to see how Tanium can help organizations meet the guidelines within the NIST Cybersecurity Framework.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 
Tanium

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Panda Security

Three Companies. Security. Machine Data.
sponsored by Splunk
BOOK: In this e-book, find out how 3 different companies are leveraging machine data to protect themselves against the latest cyberthreats, and in many cases, to address IT operations, IoT and business analytics challenges as well.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Splunk

Ten Strategies of a World-Class Security Operations Center
sponsored by CoreLight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

TOPICS: 
CoreLight

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

TOPICS: 
CoreLight

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Download this buyer's guide for the 'who, what, where, when, and why' of buying an analytics-driven SIEM.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Splunk

Deliver App Security at Scale
sponsored by F5 Networks
WHITE PAPER: Learn how malware, and other malicious traffic that slips past your firewall, can be detected and stopped at the application layer.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

TOPICS: 
F5 Networks

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Today, legacy SIEMs just can't keep up with the rate and sophistication of today's cyberattacks. Download The Seven Essential Capabilities of an Analytics-Driven SIEM and learn how you can enhance your security strategy to keep up.
Posted: 24 Jan 2019 | Published: 24 Jan 2019

TOPICS: 
Splunk

Application Security that Follows the Application
sponsored by F5 Networks
RESOURCE: Download this guide to learn how your application team can achieve greater flexibility and speed while security operations teams enforce consistent security policies across the entire application portfolio.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

TOPICS: 
F5 Networks

Understanding the Contemporary Use of Vulnerability Disclosure in Consumer Internet of Things Product Companies
sponsored by IoT Security Foundation
RESEARCH CONTENT: Vulnerability disclosure is an important topic, especially for providers of IoT products and solutions. To avoid risk, when security issues are found, providers should set a process for responding to reports and managing the public disclosure. Download this report from the IoT Security Foundation to learn more about vulnerability disclosure.
Posted: 23 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
IoT Security Foundation

Asset Management for Cybersecurity: 10 Essential Questions to Answer
sponsored by Axonius
WHITE PAPER: When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

TOPICS: 
Axonius

Building a Business Case for Cybersecurity Asset Management
sponsored by Axonius
WHITE PAPER: With many competing priorities facing information security teams, any new project must be prioritized against risk, net new capabilities, and ROI. Another challenge is the increasing number and types of devices on corporate networks. In this white paper, learn how to manage these challenges by using a cybersecurity asset management tool.
Posted: 23 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Axonius

8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: In this resource, discover 8 reasons why LogRhythm customers made the switch from SIEMs. The top reasons include stopping the bad guys, saving time and resource drain, having a better user interface and more.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
LogRhythm, Inc.

Fast-Growing AppsFlyer Automates Security Policy Validation with Axonius
sponsored by Axonius
CASE STUDY: In this case study, learn about how AppsFlyers used the Axonius platform to automate their security policy validation. With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
Axonius

IoT Security Architecture and Policy for the Enterprise a Hub Based Approach
sponsored by IoT Security Foundation
WHITE PAPER: This document from the IoT Security Foundation is intended for businesses that are looking for operational and productivity benefits of using IoT. Read on to learn about a hub-based approach and see if this architecture is right for your enterprise.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

TOPICS: 
IoT Security Foundation

How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO: In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019

TOPICS: 
Neustar

How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO: Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019

TOPICS: 
Neustar

The Unified Access Management Playing Field
sponsored by OneLogin
RESOURCE: Today, employees expect to work the way they liveā€”not to step back in time when they work, whether they're in the office or remote. Read on to find out why IT leaders are rethinking their IAM strategy and moving towards a unified approach to access management.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

TOPICS: 
OneLogin

Analyst Identity and Access Management Maturity Assessment
sponsored by OneLogin
ANALYST REPORT: To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.
Posted: 17 Jan 2019 | Published: 23 Aug 2018

TOPICS: 
OneLogin

Empowering Big Data in a Data-driven Economy
sponsored by comForte AG
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

TOPICS: 
comForte AG
76 - 100 of 2410 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement