Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed    Add to Google    Add to My Yahoo!
Filtering SoftwareReports
 
Protecting Organizations from Spyware
sponsored by Websense, Inc.
WHITE PAPER: The internet has become a critical resource employees rely on to get their jobs done. Employees use the web to perform research and gather information. Learn about the risks associated with these activities.
Posted: 04 Apr 2007 | Published: 29 Jan 2007

Websense, Inc.

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

The Benefits of an Integrated Approach to Security in the Cloud
sponsored by IBM
WHITE PAPER: This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

IBM

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Oracle HCM Cloud Solutions Your Essential Guide to Getting Maximum Value from Your Oracle HCM Cloud System
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper outlines three principles for maximizing the value of your investment in Oracle HCM Cloud over the total lifetime of your contract—and beyond.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Oracle Corporation UK Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement