Business of Information Technology  >   Business Management  >   Content Management  >  

Content Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Content Monitoring Reports
 
E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by SearchSecurity.com
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchSecurity.com

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Managing Security on Mobile Phones
sponsored by Nokia
WHITE PAPER: This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges.
Posted: 17 May 2005 | Published: 01 Apr 2005

Nokia

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

HP 3Par Secure Service Architecture
sponsored by HPE and Intel®
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HPE and Intel®

Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement