Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 
Definition continues below.
Secure Content Management Reports
1 - 25 of 97 Matches Previous Page  |  Next Page
The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Implement top-notch security software to prevent the loss of data if a ransomware attack occurs. Read this e-book to discover what you can do to avoid or recover from an attack.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Machine Learning in Cyber Security
sponsored by Recorded Future
WHITE PAPER: AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Compliance Challenges & Security Effectiveness in the Workplace
sponsored by Citrix
RESEARCH CONTENT: Organizations admit challenges in reducing the risk from unapproved apps and devices. Read this white paper to discover global trends in IT security risks.
Posted: 16 Aug 2017 | Published: 31 Mar 2017

Citrix

How to Bolster Endpoint Security Protection
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec & Blue Coat Systems

Hybrid Active Directory Security and Governance
sponsored by Quest
WHITE PAPER: Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Quest

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Customers Showcase Security Success
sponsored by Splunk
EBOOK: Data security is vital for companies in protecting sensitive business and customer data. Read this e-book to uncover 15 customer success stories and learn more about analytics-driven security and how to maintain an uninterrupted business.
Posted: 14 Aug 2017 | Published: 07 Aug 2017

Splunk

It's Time to Replace your Antivirus
sponsored by Carbon Black
WHITE PAPER: Discover how the NGAV approach incorporates endpoint security that goes beyond malware to protect its users while integrating features that target tools, techniques, tactics, and procedures.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Carbon Black

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Enable Enterprise Collaboration with a File Sharing Plan
sponsored by SkySync
WHITE PAPER: Today's workforce requires a file sharing plan that enables enterprise-wide collaboration, but this could put your data in jeopardy. This white paper examines the top security threats surrounding file sharing and how your organization can lay out a roadmap to navigate these challenges, enabling safe collaboration with hybrid cloud.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

SkySync

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

Secure Google Doc Sharing: Guardian News and Media Selects Cisco Cloudlock
sponsored by Cisco Cloudlock
CASE STUDY: Explore how the security team over at The Guardian mitigated the risk of sharing documents outside their domain and storing sensitive content in the cloud. Discover how they were able to enhance visibility into document sharing in Google Docs, control document permissions, receive exposure alerts, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

How UTHealth Medical Center Handles Data
sponsored by Virtual Instruments
WEBCAST: As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.
Posted: 19 Jul 2017 | Premiered: Jun 15, 2017

Virtual Instruments

The Numbers Don't Lie: ShareFile Delivers
sponsored by Citrix
PRODUCT LITERATURE: The numbers are in and they say ShareFile offers small businesses exactly what they really want. Open for more. See for yourself. ShareFile simply does more to help small businesses work the way they want—on any device, any time.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

GDPR and Citrix ShareFile
sponsored by Citrix
WHITE PAPER: The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Posted: 18 Jul 2017 | Published: 27 Dec 2016

Citrix

Case Study: Groundbreaking Workforce Development Enabled by AWS
sponsored by AWS - Sophos
CASE STUDY: The Louisiana Department of Corrections (DOC) needed a secure way to provide online courses for inmates, ensuring that they stayed in the designated virtual environment. Access this case study to see how the DOC was able to launch the secure AWS environments they needed to put inmates on the path to career success.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

AWS - Sophos

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce
sponsored by Citrix
WHITE PAPER: When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.
Posted: 17 Jul 2017 | Published: 31 May 2017

Citrix

3 Ways EFSS Enables Secure Content Collaboration
sponsored by Citrix
WHITE PAPER: The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Citrix

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

ComputerWeekly.com

Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE: This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.
1 - 25 of 97 Matches Previous Page    1 2 3 4    Next Page
 
SECURE CONTENT MANAGEMENT DEFINITION (continued): …  Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content. Content filtering and the products that offer this service can be divided into Web filtering, the screening of Web sites or pages, and e-mail filtering, the screening of e-mail for spam or other objectionable content. Also … 
Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement