Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Blocking Software White Papers (View All Report Types)
 
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Enable Enterprise Collaboration with a File Sharing Plan
sponsored by SkySync
WHITE PAPER: Today's workforce requires a file sharing plan that enables enterprise-wide collaboration, but this could put your data in jeopardy. This white paper examines the top security threats surrounding file sharing and how your organization can lay out a roadmap to navigate these challenges, enabling safe collaboration with hybrid cloud.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

SkySync

How Market Leaders are Delivering Exceptional Customer Experiences by Mobilizing Legacy Apps
sponsored by Capriza
WHITE PAPER: This white paper explores how to reach customers and engage them with fast, mobile, immediate apps and transactions. Learn how to mobilize your existing apps and legacy systems by finding out how innovative companies like Target and DirecTV rapidly created unique mobile apps for their businesses with little to no code.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Capriza

Don't Confuse Low-Code with No-Code
sponsored by OutSystems
WHITE PAPER: Explore the differences between low-code vs. no-code, with a particular focus on the users these tools are designed for and what they're designed to help these users do. Learn how to properly outfit your development projects with low-code and no-code tools so you can enable rapid development for cloud and mobile.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

OutSystems

Transform IT With Low-Code Development
sponsored by Cherwell
WHITE PAPER: Find out how low-code development helps organizations build customized apps without costly, time- and labor-intensive projects. Discover how to evaluate and select a low-code platform that suits your development needs.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Cherwell

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement