Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

CenturyLink Managed SAP HANA Solution with Vnomic on Cisco UCS/ACI & NetApp
sponsored by Cisco Systems, Inc. & Intel Corporation
VIDEO: How can you achieve cloud-like costs and agility with security for enterprise-scale application landscapes? Watch this five minute video to learn about a top-to-bottom policy-based approach to infrastructures that enables you to adjust applications to workloads as needed.
Posted: 17 Oct 2017 | Premiered: 25 Sep 2017

Cisco Systems, Inc. & Intel Corporation

Swedbank Leverages Automation Platform for IT Control
sponsored by Snow Software
CASE STUDY: Explore how Swedbank created a self-service portal with built-in approval processes to alleviate pressures on the helpdesk and IT team. Find out how they improved the speed at which users could access software and services while maintaining control of the approval and fulfillment processes.
Posted: 09 Oct 2017 | Published: 30 Sep 2016

Snow Software

A Practical Guide to Modern Data Architectures, Microservices, and Containers
sponsored by MapR
EBOOK: Explore how you can create a modern data architecture that brings more agility to your apps, data, and infrastructure for digital transformation initiatives. Plus, discover how to break down data siloes, tackle big data analytics challenges, increase agility with containers and microservices, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

MapR

The Future of Work: Low-Code Tools for Automating Vendor Onboarding
sponsored by K2
WEBCAST: Explore how to automate key business processes like vendor onboarding with a visual, low-code development platform that makes it easy to build apps, workflows, and forms quickly.
Posted: 13 Oct 2017 | Premiered: Oct 6, 2017

K2

5 Ways to Update Requirements Management and Accelerate Time-to-Market
sponsored by Perforce Software, Inc.
WHITE PAPER: Discover how to update requirements management software for larger and more complex projects, and uncover 5 key integrated traceability components.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Perforce Software, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement