Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Web Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Microservices Architecture: Aligning Principles, Practice & Culture
sponsored by CA Technologies
EBOOK: Microservices, when used correctly, can have a positive impact on your organization – just ask Amazon and Netflix. But you can fall into traps if you don't approach them properly. In this 3-part e-book, learn about the microservices landscape, principles, technologies, success stories, and more. Plus, learn how to apply microservices yourself.
Posted: 17 Mar 2017 | Published: 17 Mar 2017

CA Technologies

Top IT Trends in 2017: Cybersecurity
sponsored by Cisco and Dimension Data
WHITE PAPER: With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Vendor Comparison: Distributed File Systems and Object Storage
sponsored by IBM
ANALYST REPORT: Data growth is exceeding 40% year over year in many enterprises. This number may only grow as we get further into the era of big data, so infrastructure and operations leaders are looking for storage products to handle increasing use cases without breaking the bank. Access this Gartner report to explore the current scale-out storage system market.
Posted: 24 Mar 2017 | Published: 20 Oct 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement