Business of Information Technology  >   Business Management  >   Content Management  >  

Content Filtering

RSS Feed    Add to Google    Add to My Yahoo!
Content Filtering White Papers (View All Report Types)
The State of Mobile Application Insecurity: Reducing the Risk of Unsecure Apps
sponsored by IBM
WHITE PAPER: In this case study, you will learn how to successfully reduce the risk of unsecured mobile apps in your business, and see what steps enterprises are taking to secure these apps.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


The 2015 Mobile Workforce Report for the Middle East and Africa
sponsored by Dimension Data
WHITE PAPER: In this global report, you will address the IT and security challenges that introducing a mobile workforce presents. Focusing on the Middle East and Africa, learn how organizations in these geographies are driving end-user computing growth, as well as get an insider's look at enterprise mobile app trends for 2016.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Dimension Data

Overcoming the Big Disconnect in Web Security
sponsored by Akamai
WHITE PAPER: This white paper explains why partnering with a security service provider is an effective way to tackle many of the security issues enterprises face. Learn how to adapt to the shifting threat landscape by locating a platform that provides cloud security solutions.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015


The Rise of the Mobile Worker in Australia and Asia
sponsored by Dimension Data
WHITE PAPER: In this report, you will glean the global state of the mobile workforce for 2015 in Australia and Asia and discover how to embrace successful end-user computing. Read on to access the emerging mobile trends for 2016 and foster a collaborative mobile environment in your organization.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Dimension Data

The Top 10 Must-Haves for Secure Enterprise Mobility Management
sponsored by Citrix
WHITE PAPER: Security is the primary inhibitor to both enterprise mobility and BYOD programs. In this white paper, you will learn the 10 must-ask questions for EMM solution providers regarding their mobility security frameworks.
Posted: 27 Oct 2015 | Published: 31 May 2013


Ensuring Compliance in the Asia Pacific Region with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Doing business in Australia, New Zealand, Singapore, or other parts of the Asia Pacific region means one key concern – privacy. This informative resource considers threats to privacy, essential encryption, and SSL certificate best practices.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Symantec Corporation

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions
sponsored by SAP America, Inc.
WHITE PAPER: This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Posted: 01 Feb 2008 | Published: 01 Jan 2007

SAP America, Inc.

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement