Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security White Papers (View All Report Types)
IT’s Guide for Securing and Managing Business Content
sponsored by Box
WHITE PAPER: This white paper explores how you can secure collaboration to make content more current, mobile, and accessible. Discover how to enable seamless syncing and sharing across devices to increase company-wide productivity.
Posted: 08 Sep 2016 | Published: 08 Sep 2016


Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015


Enable secure mobile collaboration for your business
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Total Economic Impact™ Of Silver Peak’s WAN Optimization Solution
sponsored by Silver Peak
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Silver Peak’s WAN optimization solution on their organizations. Forrester’s aim is to clearly show all of the calculations and assumptions used in the analysis.  Read this study to learn so much more.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Silver Peak

Secure Internet Single Sign-On (SSO) 101
sponsored by Ping Identity Corporation
WHITE PAPER: Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.
Posted: 05 Jun 2009 | Published: 08 Jun 2009

Ping Identity Corporation

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006


Managing Security on Mobile Phones
sponsored by Nokia
WHITE PAPER: This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges.
Posted: 17 May 2005 | Published: 01 Apr 2005


Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008


TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement