Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content Management Reports
1 - 25 of 98 Matches Previous Page  |  Next Page
How to Provide Simple, Secure Access to All of Your Organization's Synced Content
sponsored by IntraLinks, Inc
WEBCAST: You need to provide your employees with a way to work collaboratively and securely with external partners—otherwise they may put your content at risk. Watch this quick video to learn how to securely collaborate and share files with external partners.
Posted: 13 Oct 2016 | Premiered: Oct 13, 2016

IntraLinks, Inc

Having Trouble Sharing Content Externally?
sponsored by IntraLinks, Inc
MICROSITE: While most companies are fixing their security breaches and data leaks, they aren't addressing the security gaps that come from external content sharing. Access this blog to learn how to ensure secure collaboration between internal and external partners, and make sure that your security efforts don't go to waste.
Posted: 13 Oct 2016 | Published: 23 Jun 2016

IntraLinks, Inc

Enable Collaboration without Compromising Content
sponsored by IntraLinks, Inc
CASE STUDY: Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what Young New Yorkers, a non-profit organization, did to ensure that they could maintain their collaborative efforts without compromising content security.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

IntraLinks, Inc

It's 2016— Do You Know Where Your Content and Data Is?
sponsored by IntraLinks, Inc
MICROSITE: Do you know where your content goes once it leaves the company? Who can access it? There's been so much focus on accessing content faster and from further away, but we've lost track of security. Access this blog to learn about data sovereignty and how to track your data no matter where it goes.
Posted: 11 Oct 2016 | Published: 28 Jul 2016

IntraLinks, Inc

Sharing Enterprise Content Beyond the Firewall
sponsored by IntraLinks, Inc
WEBCAST: Regardless of industry or business process, nearly everything now involves the sharing of content with external business partners. Access this webinar to learn how to ensure secure inter-enterprise collaboration, explore the security and cost challenges of sharing beyond your firewall, and more.
Posted: 06 Oct 2016 | Premiered: Oct 6, 2016

IntraLinks, Inc

Securely Extend Your SharePoint® Content Externally
sponsored by IntraLinks, Inc
WEBCAST: External content sharing requires you to strike a balance between security and productivity that is difficult to find. Access this webinar to explore the security and cost challenges of sharing beyond your firewall as well as keys to secure, timely collaboration practices.
Posted: 06 Oct 2016 | Premiered: Oct 5, 2016

IntraLinks, Inc

Creating Secure, External Collaboration Portals
sponsored by IntraLinks, Inc
WHITE PAPER: Internal content sharing has been serving enterprises very well behind firewalls, but when it comes time to extend that to inter-enterprise applications, a number of IT challenges come into play. Discover how a hybrid platform keeps collaboration secure when sharing within the enterprise or externally and what to look for when considering vendors.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

IntraLinks, Inc

5 Ways to Improve the Compliance of External Content Sharing through SharePoint
sponsored by IntraLinks, Inc
WHITE PAPER: Sharing content with external business partners and customers is a daily occurrence and can be a logistical nightmare. Discover a platform that helps unlock the value of your SharePoint content by delivering a safe and compliant environment for you to get work done.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

IntraLinks, Inc

Buyer's Guide to Enterprise Collaboration Solutions
sponsored by IntraLinks, Inc
WHITE PAPER: Content collaboration platforms provide security and ease of use so mission-critical processes aren't interrupted. Learn what to look for in these platforms and how to decide which one is right for your organization.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

IntraLinks, Inc

Managing Cultural Change When Moving to the Cloud
sponsored by Box
WEBCAST: This webcast examines the technology that Hillwood leveraged to meet and conquer challenges like slow, specialized file sharing, and using email to send files back and forth. Discover the modern content management and collaboration platform they implemented to enable secure and easy file sharing.
Posted: 12 Sep 2016 | Premiered: Jul 31, 2016

Box

Project Success Plan: Rethinking Enterprise Content Management
sponsored by OpenText
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

OpenText

IT’s Guide for Securing and Managing Business Content
sponsored by Box
WHITE PAPER: This white paper explores how you can secure collaboration to make content more current, mobile, and accessible. Discover how to enable seamless syncing and sharing across devices to increase company-wide productivity.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

Box

Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Citrix

See How the Miami Marlins Protects Sensitive Scouting and Operation Documents
sponsored by Citrix
WEBCAST: Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.
Posted: 30 Aug 2016 | Premiered: Jul 22, 2016

Citrix

4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Enable secure mobile collaboration for your business
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Customer Story: Kuwait Petroleum Corporation Needed Control of Company Data Sharing
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

IBM

Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE: This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.
1 - 25 of 98 Matches Previous Page    1 2 3 4    Next Page
 
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement