Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Tools

RSS Feed    Add to Google    Add to My Yahoo!
Web Filtering Tools White Papers (View All Report Types)
 
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Beyond Next-Gen: Defining Future-ready Endpoint Security
sponsored by Trend Micro
WHITE PAPER: ESG conducted market research to explore how organizations employ advanced endpoint security controls. Learn how the endpoint itself has changed, how its weaknesses are exploited to perpetuate attacks, and the techniques and controls that can mitigate them.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Trend Micro

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

Rapid Modeling and Prototyping for the Agile Enterprise
sponsored by Metavine
WHITE PAPER: This paper explores how to bring the principles of rapid app development to modeling and prototyping, allowing you to create faster and more efficient workflows. Discover an agile strategy that enhances your ability to model processes and user experience, define business rules and data ontologies, and integrate legacy data and systems.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Metavine

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Initiate Business Transformation with Windows 10 IoT
sponsored by Microsoft
WHITE PAPER: This white paper explores how Windows 10 IoT helps facilitate the adoption of an IoT platform for app development, integration, and deployment. Discover how to simplify IoT app management, enhance control over update deployments, generate insights faster, drive continuous innovation, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Microsoft

Uncover Often Overlooked Holes in Your Security
sponsored by Dell SecureWorks
WHITE PAPER: Learn how a second opinion on your security policies could be beneficial in ways that could surprise your organization. Access now to discover improved cybersecurity safeguards, how to close hidden exposure to unknown external web connections, and more.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Dell SecureWorks

Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement