Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed    Add to Google    Add to My Yahoo!
Filtering Software White Papers (View All Report Types)
 
Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Architectural Choices for the HANA-Bound SAP Customer
sponsored by IBM
WHITE PAPER: This white paper takes an in-depth look at the architectural choices available to SAP customers who have decided to move to HANA. Learn now about the evolution toward HANA, its next stage, and the advantages behind certain partnerships.
Posted: 06 Apr 2016 | Published: 28 Aug 2015

IBM

The Application Modernization Challenge: Choosing the Right Approach
sponsored by GizmoxTS
WHITE PAPER: This resource compares different application modernization approaches to help you determine the right choice for your project. Discover the pros and cons of automatic migration, manual rewrite, and transposition according to criteria like budgeting costs, QA & maintenance, project time, and more.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

GizmoxTS

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn the results of an independent test of the Check Point 13500 Next Generation Threat Prevention Appliance with Threat Emulation Cloud Service R77.20.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Should On-Prem Apps Use SaaS Monitoring?
sponsored by New Relic
WHITE PAPER: Need better visibility into the health of the applications running in your data center? Software-as-a-service (SaaS) solutions are the best way to monitor on-prem apps and gain the freedom your team needs. Discover the top 7 reasons to use SaaS monitoring.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

New Relic

Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER: The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Palo Alto Networks

Upgrading from SQL Server 2005
sponsored by Microsoft
WHITE PAPER: Discover how you can achieve mission critical performance, maintain security and compliance, and modernize your data platform by upgrading your SQL server 2005 to the latest version.
Posted: 28 Mar 2016 | Published: 28 Mar 2016

Microsoft

Isolate and Protect your Mission Critical Systems after Support Ends
sponsored by Unisys
WHITE PAPER: When it comes to security concerns for a tool's end-of-life, companies are left with the flight or fight response. Learn what you can do to stay defensive after support expires for Windows products, and ways to reduce the attack surface for the entire enterprise.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement