Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content Management White Papers (View All Report Types)
1 - 25 of 57 Matches Previous Page  |  Next Page
Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014


Healthcare's Now in the Cloud with MDM
sponsored by IBM
WHITE PAPER: This white paper outlines the risks associated with incorporating MDM in hospital environments, and examines an MDM solution specific unto healthcare organizations.
Posted: 11 Aug 2015 | Published: 11 Aug 2015


The 3 Steps to Protect Your Software Apps from Failure and Attack
sponsored by Rogue Wave Software
WHITE PAPER: This white paper outlines three important steps that software development teams can follow to identify critical coding errors and security vulnerabilities, and protect software against failure and malicious attacks.
Posted: 11 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


EEMM Strategy and Vendor Comparison: Who Makes the Grade?
sponsored by IBM
WHITE PAPER: Access this white paper to examine EMM and MDM vendors, and determine which products are most appropriate your enterprise needs.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


Enterprise Mobility Evolution: The New Age of BYOD
sponsored by StarMobile
WHITE PAPER: The consumer mobility market has exploded, experiencing massive growth. This white paper outlines a strategy for enterprise mobility management (EMM), as companies prepare to develop and support thousands of new apps. Read on to access the new approaches to app development.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015


Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Bolstering Network Security in a BYOD World
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses how you can stop the threats introduced by BYOD trends by implementing comprehensively visibility into all network traffic.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Case Study - NVIDIA Enables True SAP Security
sponsored by Onapsis
WHITE PAPER: This whitepaper explains how NVIDIA, a well-known GPU and SOC technology provider, was able to gain the capabilities needed to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.
Posted: 22 Oct 2014 | Published: 22 Oct 2014


Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Market Trends - Secure File Sharing and Collaboration in the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions.
Posted: 02 Jun 2014 | Published: 04 Feb 2014

Accellion, Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013


CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013


Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012


The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

1 - 25 of 57 Matches Previous Page    1 2 3    Next Page
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement