Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Nanny

RSS Feed    Add to Google    Add to My Yahoo!
Internet Nanny White Papers (View All Report Types)
 
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

8 Key API Performance Indicators for Digital Business
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper explores and defines some of the most common and useful key API performance indicators (KAPIs). Discover how to boost your API management and analytics with KAPIs like registered API keys, usage consistency, queries per second, and 5 more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

TIBCO Software Inc.

Firewall Buyer's Guide: Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Learn to navigate your way through the firewall market, and choose a program that will allow your administrators to easily define which applications are and are not allowed on your business' network. Discover 10 essential characteristics of the modern firewall, tips for constructing a RFP, how to physically evaluate your firewall, and more.
Posted: 15 Dec 2016 | Published: 15 Dec 2016

Palo Alto Networks

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Forget Hand-Coding: 5 Development Challenges to Consider
sponsored by OutSystems
WHITE PAPER: In this white paper, you'll explore 5 development challenges to consider when using hand coding over a RAD platform as a development method. Learn why apps typically require 10x more work today, and tools that make development times faster and more simplified.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement