Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Software Delivery Self-Assessment: Where Do You Stand Among Your Peers?
sponsored by IBM
ASSESSMENT TOOL: How can you ensure optimal quality while delivering your applications faster than the competition? With just 15 questions, you can evaluate your organization's software delivery process and see where you stand relative to your peers.
Posted: 14 Apr 2016 | Published: 30 Mar 2016

IBM

CW@50: March editions of Computer Weekly
sponsored by ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

How to Initiate Managed Network Security Services
sponsored by Level 3 Communications, Inc.
EGUIDE: In this e-guide, networking expert David Jacobs outlines how to initiate and maintain a successful managed network security relationship between provider and customer.
Posted: 21 Mar 2016 | Published: 18 Mar 2016

Level 3 Communications, Inc.

SDN 102: Software Defined Networks and the Role of Application Delivery Network Services
sponsored by Citrix
WHITE PAPER: Software Defined Networking (SDN) has evolved over the years as applications and cloud computing become more prominent. However, with everyone at different steps along the way to SDN adoption, explore some of the models for SDNs, identify some of the associated use cases, and describe methods to integrate application delivery network services.
Posted: 21 Apr 2016 | Published: 30 Apr 2015

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement