Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed    Add to Google    Add to My Yahoo!
Filtering Software Reports
Content Filtering: Taming the Wild Web
sponsored by
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Application Modernisation: The Essential Guide
sponsored by
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

A Platform for Modernizing Java Applications: Designing Workloads for the Cloud and Modern Ecosystems
sponsored by Red Hat
WHITE PAPER: Java-based applications can enable modern development in a cloud-friendly environment. Learn how cloud-based application deployment allows you to take advantage of existing resources while moving toward newer (read: digital) application models.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Red Hat

Leveraging Automation for DevOps
sponsored by Chef Software
WHITE PAPER: This white paper explores how to implement automated and collaborative workflows in a way that reduces risk, ensures stability, and guarantees regulatory compliance. Discover how to create a dynamic infrastructure that will aid in your company's DevOps transformation and optimize its use of automation.
Posted: 20 Oct 2016 | Published: 30 Jun 2016

Chef Software

Stop Malware Attacks Before They Strike With This Network Threat Analytcs Module
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how LogRhythm's Network Threat Analytics module can help you detect, prioritize, and neutralize cyber threats before they attack. Learn how you can immediately detect botnets and other malware, quickly identify disguised data transfers, and more.
Posted: 10 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement