Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Tools

RSS Feed    Add to Google    Add to My Yahoo!
Web Filtering Tools White Papers (View All Report Types)
 
Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Enable Rapid IT Service Delivery and Innovation with an Infrastructure Built for Cloud-Native Applications
sponsored by Red Hat
WHITE PAPER: This web book explores the cloud infrastructure and tools required to support agile IT methods and applications, and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery. Learn how innovative applications propelled by IT can create entirely new revenue streams.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Red Hat

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

Competitive Review: 2 Integrated Business Solutions under Scrutiny
sponsored by Red Hat
WHITE PAPER: Access this review on BPM tools to find a side-by-side comparison of two products aimed at helping business leaders and developers find success with business process strategies, and determine which one is right for your organization.
Posted: 05 Apr 2016 | Published: 30 Oct 2015

Red Hat

Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Integrating with Saleforce.com using Cloud Services
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, discover how a cloud-based integration platform can help you maximize the value of your SaaS and on-premises applications. Also learn about the pre-built integrations that can simplify deployments of Salesforce.com.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

Oracle Corporation

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement