Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security White Papers (View All Report Types)
 
The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Kingpin Communications

Clinical Analytics Jumps in Importance
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Access this expert e-guide to explore the impact of health data analytics on organizations today, and how your peers are leveraging analytics to improve clinical care quality and compliance.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Allscripts Healthcare Solutions

Top 5 Network Security Challenges Faced By the Distributed Enterprise
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper, you will discover how to deploy and manage consistent, enterprise-grade network security and secure wireless networks across all your remote locations. In addition, you'll be able to visibly track network health, threats and compliance issues to assist in proactive business decisions.
Posted: 14 Jan 2016 | Published: 16 Dec 2015

WatchGuard Technologies, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Secure Internet Single Sign-On (SSO) 101
sponsored by Ping Identity Corporation
WHITE PAPER: Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.
Posted: 05 Jun 2009 | Published: 08 Jun 2009

Ping Identity Corporation

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Sophos, Inc.

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008

Imperva

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement