Business of Information Technology  >   Business Management  >   Content Management  >  

Content Filtering

RSS Feed    Add to Google    Add to My Yahoo!
Content Filtering Reports
Bolstering Network Security in a BYOD World
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses how you can stop the threats introduced by BYOD trends by implementing comprehensively visibility into all network traffic.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

How to Provide Secure Application Access and Improve Network Performance
sponsored by Palo Alto Networks
CASE STUDY: In this case study, learn how the University of Adelaide transformed their non-scalable network security system by deploying next-generation firewall technology, offering granular visibility of threats and better control of Internet applications.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Next-Generation Security in a Mobile Era
sponsored by
EBOOK: In this handbook, learn how enterprise mobility management and next-generation security tools can help your enterprise mitigate an ever-growing number of mobile risks.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Safeguard Your Financial Information with a Complete Governance Framework
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper explains how to reduce the risk associated with exchanging financial information between the corporation and outside auditors. Learn how to secure your finance team and maximize your productivity with insight into key transactions.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

IntraLinks, Inc

Mastering Mobile Application Management: How to Adopt MAM
sponsored by SearchMobileComputing
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015


Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007


Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Success Story: Astaro Gets the Checkered Flag at F1 Boston
sponsored by Astaro
CASE STUDY: New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.
Posted: 30 Aug 2011 | Published: 30 Aug 2011


Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions
sponsored by SAP America, Inc.
WHITE PAPER: This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Posted: 01 Feb 2008 | Published: 01 Jan 2007

SAP America, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement