Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Nanny

RSS Feed    Add to Google    Add to My Yahoo!
Internet Nanny White Papers (View All Report Types)
The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016


Why Now Is the Time to Re-Architect the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

A Platform for Modernizing Java Applications: Designing Workloads for the Cloud and Modern Ecosystems
sponsored by Red Hat
WHITE PAPER: Java-based applications can enable modern development in a cloud-friendly environment. Learn how cloud-based application deployment allows you to take advantage of existing resources while moving toward newer (read: digital) application models.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Red Hat

7 Steps for Building a Digital Strategy in Distribution
sponsored by Infor
WHITE PAPER: The wholesale distribution industry is facing massive disruption due to technological growth, and most companies are taking a reactionary approach. You need to rethink your digital strategy now, because a reactionary "strategy" means you will be left behind. Read on to learn 7 steps to building your best digital distribution strategy.
Posted: 14 Oct 2016 | Published: 31 Aug 2016


Mobile Security: Gain Real-Time Threat Prevention
sponsored by Wandera
WHITE PAPER: Learn how to gain real-time threat prevention, compliance and data cost management for mobile devices with a unique approach to enterprise mobility management.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


The CASB Challenge: APIs or Proxies?
sponsored by Palerra Inc.
WHITE PAPER: Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Palerra Inc.

The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement