Software  >   Systems Software  >   Security Software  >  

Internet Access Control Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Access Control Software White Papers (View All Report Types)
 
Reinforce Business Objectives and Achieve ROI with Internet Identity Security
sponsored by Ping Identity Corporation
WHITE PAPER: Read this white paper to learn how after deploying PingFederate or PingConnect your organization will yield a high return on investment and run more efficiently and will have distinct competitive advantage over companies that do not leverage Internet Identity Security Software.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Ping Identity Corporation

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

How Web Security Improves Productivity and Compliance
sponsored by Webroot
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

Webroot

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeekerâ„¢ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006

Verio

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement