Business of Information Technology  >   Business Management  >   Content Management  >  

Internet Content Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Internet Content Monitoring Reports
 
Mobile Device Security Overview
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchSecurity.com

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

LimelightSTREAM: Fast, reliable, and scalable delivery of rich media streams
sponsored by Limelight Networks, Inc.
PRODUCT LITERATURE: Check out this brief paper to learn more about LimelightSTREAM, a high performance content delivery network that enables you to make your rich media available to every user on demand.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Limelight Networks, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Published: 14 May 2007

Symantec Corporation

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement