Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content ManagementReports
1 - 25 of 75 Matches Previous Page  | Next Page
EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: Read this whitepaper to find out three ways to balance IT needs with user demands.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Directions in Enterprise Clinical Content Management
sponsored by Perceptive Software
WHITE PAPER: Learn how to build a clinical content management strategy that securely stores data and leverages onsite and cloud options for cost savings.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Perceptive Software

Enhanced threat detection: The next (front) tier in security
sponsored by IBM
EGUIDE: This expert e-guide explains how useful threat detection can be for your business and what its capabilities consist of.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

ComputerWeekly.com

Going beyond MDM: Embracing BYOD through secure app and data delivery
sponsored by Citrix Systems, Inc.
WHITE PAPER: Uncover a new approach to mobile device management that shifts the focus from managing devices themselves to managing their content, applications and data. Learn how this approach can unify your security efforts by reading on now.
Posted: 13 Nov 2012 | Published: 01 Jun 2014

Citrix Systems, Inc.

Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

Mobile Device Security Overview
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchSecurity.com

Market Trends - Secure File Sharing and Collaboration in the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions.
Posted: 02 Jun 2014 | Published: 04 Feb 2014

Accellion, Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Secure Web Gateway Overview: Implementation Best Practices
sponsored by Sophos, Inc.
EGUIDE: This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Sophos, Inc.

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.
1 - 25 of 75 Matches Previous Page    1 2 3    Next Page
 
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement