Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Blocking Software White Papers (View All Report Types)
 
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

A Structured Design Approach to Business Automation
sponsored by Red Hat
WHITE PAPER: Discover how to modernize business automation by capitalizing on advances in software development infrastructure, and incorporate them into a new structured, 6-step design approach that eliminates additional risk.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Red Hat

Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER: Discover how your enterprise can put the OODA Loop philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breeches. Lean to observe a crisis from all angles, review events in the context of other activity on network to establish a timeline, quickly implement remediation on affected assets, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

AlienVault

Market Guide for Network Access Control
sponsored by Aruba Networks
WHITE PAPER: NAC solutions enable organizations to implement policies for controlling device and user access to corporate networks. Explore this research to understand how analysts recommend evaluating and selecting NAC solutions that meet your needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Aruba Networks

Strategies for Implementing Windows 10
sponsored by Flexera Software
WHITE PAPER: Universal Applications may be one of the most important features of Windows 10. However, this new technology could cause compatibility issues with applications for enterprise deployments. Find out how you can test hundreds of apps and performance levels with the push of a button and deploy Windows 10 successfully.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Flexera Software

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement