Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Blocking Software White Papers (View All Report Types)
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016


Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

Incident Response Capabilities in 2016
sponsored by LogRhythm, Inc.
WHITE PAPER: As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.
Posted: 01 Sep 2016 | Published: 30 Jun 2016

LogRhythm, Inc.

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016


Leveraging Automation for DevOps
sponsored by Chef Software
WHITE PAPER: This white paper explores how to implement automated and collaborative workflows in a way that reduces risk, ensures stability, and guarantees regulatory compliance. Discover how to create a dynamic infrastructure that will aid in your company's DevOps transformation and optimize its use of automation.
Posted: 20 Oct 2016 | Published: 30 Jun 2016

Chef Software

How is Deskera, the next NetSuite?
sponsored by Deskera
WHITE PAPER: The cloud-based ERP/CRM tool market is going through a shakeup. Before you start looking at vendors, take a look at what your current business needs are. Access this white paper to learn which considerations you need to prioritize, and why, as well as how your business size may affect which options are available to you.
Posted: 17 Oct 2016 | Published: 17 Oct 2016


Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement