Business of Information Technology  >   Business Management  >   Content Management  >  

Internet Content Filtering

RSS Feed    Add to Google    Add to My Yahoo!
Internet Content Filtering Reports
The 2015 Rise of the Mobile Workforce in Asia Pacific
sponsored by Dimension Data
WHITE PAPER: In this white paper, you will learn about the state of the mobile workforce in 2015. Discover how to embrace successful end-user computing, key into MDM's relationship with market maturity, and see why mobile IT management and enterprise mobile apps are set to dominate in 2016.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Dimension Data

Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015


Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


The Essential Guide to Building a Strong MDM Foundation
sponsored by IBM
WHITE PAPER: In this essential guide, you will learn the about 12 best practices for implementing mobile device management in your business. Read on here to start introducing these MDM strategies, taking your organization to the next level.
Posted: 09 Oct 2015 | Published: 09 Oct 2015


Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Technical guide on Web Security Gateways
sponsored by
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

Solutions for Healthcare and HIPAA Compliance
sponsored by Citrix
WHITE PAPER: This guide reviews how new mobile technologies can help improve care using modern applications.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


HP 3Par Secure Service Architecture
sponsored by HPE and Intel┬«
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HPE and Intel®

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement