This paper presents the concept of security management through collaboration highlighting the limitations for conventional security management systems and the challenges in maintaining an acceptable level of security in organizational environments. There are presented four different aspects regarding information security, aspects that involve malware threats, perimeter protection, exploiting vulnerabilities and detection of vulnerabilities. Analyzing a set of experiments regarding malware protection the paper concludes the need to improve existing protection systems by standardization and collaboration. A set of indicators for measuring the level of security by considering each of four aspects, is presented and analyzed, highlighting the benefits obtained by using collaboration in the process of managing information security. A qualitative indicator is built based on the four aspects of security presented in the paper.Keywords: Collaborative Security Management, Organizational Environment, Security System, Malware Threats, Security Indicator, Perimeter Protection, Intrusion Prevention(ProQuest: ... denotes formulae omitted.)1IntroductionCollaboration in computer systems is closely linked to the evolution of distributed systems and the evolution of communication systems. The fact that computer systems are increasingly used as support for collaboration within business operations, provides the following benefits:* operations are conducted in a rapid and controlled pace through automation and communication channels* there is a possibility to observe the weaknesses of the business process in relation to the relationships between collaborators* the possibility of establishing a historical database used to forecast trends for short and medium term* business continuity depends less on the employees migrationThe benefits of information systems depend to a great extent of information and access to information. It is important for the information to be accessible and consistent with the initial state. Altering information in an unauthorized manner and not based on a real context, reduces the effectiveness of information systems in business processes to the point where it affects an organization's ability to carry out daily activities. It is important that information and access to information to be managed in an appropriate manner so that the computer system that relies on this information to be considered reliable. Issues of confidentiality, integrity and availability of information are being considered in the notion of information security. Information security management operations are represented by mechanisms and techniques used for achieving information security. Information security management in a collaborative computing environment is often a difficult task because people tend to neglect aspects of cybersecurity focusing on achievement of short-term business goals. To prevent unpleasant situations where important information is losing its confidentiality state or it is fraudulently altered, requires the use of computer systems to identify situations that present security risks and block human actions that led to such a situation or issue warnings with respect to the situation. If in small organizations information security is relatively easy to manage and do not necessarily require well-established management processes for managing security, in large and very large organizations information security management is a necessity due to the diversity and variety of environments across the organization. Considering computer security in the global context, the companies are facing common threats coming from outside the company and also particular threats that are specific to each organization. Information security management through collaboration aims to improve security processes that manage threats coming from outside. Using collaboration in this situation makes sense in the context of the organizations using information systems to support daily activities are connected to the Internet, either directly or indirectly. …