Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content ManagementWhite Papers (View All Report Types)
1 - 25 of 48 Matches Previous Page  | Next Page
Take control of your records: HP Records Management Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Discover how HP Records Management Services can help simplify compliance with regulatory mandates, boost collaboration and productivity, automate processes and provide secure access to document.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

Best Practices in Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This expert research report looks at the best practices for preparing your IT environment for mobile initiatives and provides a step-by-step approach for mobile and security specialists.
Posted: 09 Sep 2014 | Published: 04 Feb 2014

Citrix

Managed File Transfer: Business Users Need Visibility
sponsored by IBM
WHITE PAPER: End-users are striving to enable collaboration and integrate as many business processes as possible, and in our information-driven society, managed file transfer (MFT) is tied closely with achievement of critical business objectives.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

MFT Center of Excellence Whitepaper
sponsored by IBM
WHITE PAPER: Many companies have implemented managed file transfer (MFT) as a way to gain control over a wide array of file transfer activities.  By employing these products, companies have remediated the inherent risk of File Transfer Protocol (FTP).
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

A Guide to Disaster Recovery in the Cloud
sponsored by Avnet Technology Solutions
WHITE PAPER: Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Avnet Technology Solutions

EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: Read this whitepaper to find out three ways to balance IT needs with user demands.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Directions in Enterprise Clinical Content Management
sponsored by Perceptive Software
WHITE PAPER: Learn how to build a clinical content management strategy that securely stores data and leverages onsite and cloud options for cost savings.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Perceptive Software

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Market Trends - Secure File Sharing and Collaboration in the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions.
Posted: 02 Jun 2014 | Published: 04 Feb 2014

Accellion, Inc.

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Accelerated Transactions, Increased Security a Bullseye for Dart Transit Company, Trading Partners
sponsored by EXTOL International, Inc.
WHITE PAPER: Read this brief white paper to learn how Dart Transit Company implemented an electronic data interchange strategy (EDI) that offers faster, more secure data transactions for their trading partner interactions, and more effective automation tools to manage the business integration process.
Posted: 01 Aug 2011 | Published: 01 Aug 2011

EXTOL International, Inc.

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Total Economic Impact™ Of Silver Peak’s WAN Optimization Solution
sponsored by Silver Peak
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Silver Peak’s WAN optimization solution on their organizations. Forrester’s aim is to clearly show all of the calculations and assumptions used in the analysis.  Read this study to learn so much more.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Silver Peak

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.
1 - 25 of 48 Matches Previous Page    1 2    Next Page
 
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement