Business of Information Technology  >   Business Management  >   Content Management  >  

Internet Content Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Internet Content Monitoring Reports
 
Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

Banca Carige unlocks the growth potential of big data
sponsored by IBM
CASE STUDY: In this case study, learn how a major international bank harnessed the power of big data to gain valuable customer insights. Explore what technology they leveraged, strategies they implemented to access previously untapped business opportunities, and the biggest benefits they received from their new initiatives.
Posted: 16 Jun 2016 | Published: 29 Mar 2013

IBM

Make More Money with Enterprise Mobility Suite Part 1
sponsored by Microsoft
WHITE PAPER: Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.
Posted: 25 Mar 2016 | Published: 27 Nov 2015

Microsoft

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos, Inc.

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement