Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content Management Reports
1 - 25 of 116 Matches Previous Page  |  Next Page
Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

Solutions for Healthcare and HIPAA Compliance
sponsored by Citrix
WHITE PAPER: This guide reviews how new mobile technologies can help improve care using modern applications.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


When it Comes to File Sync-and-Share, Security is Vital
sponsored by Linoma Software
EGUIDE: This e-guide discusses 3 approaches to file sync-and-share strategies, and the security concerns associated. Access now to find out how you can share your files while remaining confident in their security.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Linoma Software

Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation

The 2015 Mobile Workforce Report for the Middle East and Africa
sponsored by Dimension Data
WHITE PAPER: In this global report, you will address the IT and security challenges that introducing a mobile workforce presents. Focusing on the Middle East and Africa, learn how organizations in these geographies are driving end-user computing growth, as well as get an insider's look at enterprise mobile app trends for 2016.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Dimension Data

The Rise of the Mobile Worker in Australia and Asia
sponsored by Dimension Data
WHITE PAPER: In this report, you will glean the global state of the mobile workforce for 2015 in Australia and Asia and discover how to embrace successful end-user computing. Read on to access the emerging mobile trends for 2016 and foster a collaborative mobile environment in your organization.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Dimension Data

The 2015 Rise of the Mobile Workforce in Asia Pacific
sponsored by Dimension Data
WHITE PAPER: In this white paper, you will learn about the state of the mobile workforce in 2015. Discover how to embrace successful end-user computing, key into MDM's relationship with market maturity, and see why mobile IT management and enterprise mobile apps are set to dominate in 2016.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Dimension Data

Evaluating Internal Segmentation Firewalls and Network Topography
sponsored by Fortinet, Inc.
ANALYST REPORT: This white paper examines internal segmentation firewalls (ISFW), and demonstrates how ISFWs can protect your internal network. Secure your apps, data, and users from threats with policy-based segmentation.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Avoid BYO Policy and Security Pitfalls By Addressing Mobile Threats
sponsored by Citrix
WHITE PAPER: This white paper highlights the legal risks of personally owned technology, and offers policy recommendations and mitigating technology solutions to protect business information. Examine 5 practical case studies to help you recognize and address potential threats from using personal devices at work.
Posted: 28 Oct 2015 | Published: 30 Sep 2014


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


The Top 10 Must-Haves for Secure Enterprise Mobility Management
sponsored by Citrix
WHITE PAPER: Security is the primary inhibitor to both enterprise mobility and BYOD programs. In this white paper, you will learn the 10 must-ask questions for EMM solution providers regarding their mobility security frameworks.
Posted: 27 Oct 2015 | Published: 31 May 2013


Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Safeguard Your Financial Information with a Complete Governance Framework
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper explains how to reduce the risk associated with exchanging financial information between the corporation and outside auditors. Learn how to secure your finance team and maximize your productivity with insight into key transactions.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

IntraLinks, Inc

The Critical Capabilities for High-Security Mobility Management
sponsored by Citrix
ANALYST REPORT: This white paper will guide you to select the right EMM software and hardware vendors that offer top-notch security. Read on to evaluate a host of mobility management platforms, and to learn how to secure the small mobile devices in your organization that do not yet run workstation-class operating systems.
Posted: 21 Oct 2015 | Published: 29 Jul 2015


Overcoming the Big Disconnect in Web Security
sponsored by Akamai
WHITE PAPER: This white paper explains why partnering with a security service provider is an effective way to tackle many of the security issues enterprises face. Learn how to adapt to the shifting threat landscape by locating a platform that provides cloud security solutions.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Deliver a Secure and Fluid Web Experience with Next-Gen Firewall Technology
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will learn how CESA leveraged a next-generation firewall and security platform in conjunction with in-house developed integration components, allowing for a truly fluid, secure web experience. Access now to discover how you can target dangerous apps, sites, and content without missing a beat.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

How to Provide Secure Application Access and Improve Network Performance
sponsored by Palo Alto Networks
CASE STUDY: In this case study, learn how the University of Adelaide transformed their non-scalable network security system by deploying next-generation firewall technology, offering granular visibility of threats and better control of Internet applications.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks

Conquering Network Security Challenges in Distributed Enterprises
sponsored by Palo Alto Networks
WHITE PAPER: This whitepaper provides guidance for businesses evaluating the current state of their network security. Learn how to centralize network security governance and prioritize threats without affecting business flow.
Posted: 15 Oct 2015 | Published: 30 Jun 2015

Palo Alto Networks

The State of Mobile Application Insecurity: Reducing the Risk of Unsecure Apps
sponsored by IBM
WHITE PAPER: In this case study, you will learn how to successfully reduce the risk of unsecured mobile apps in your business, and see what steps enterprises are taking to secure these apps.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

1 - 25 of 116 Matches Previous Page    1 2 3 4    Next Page
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement