Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Filtering

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Filtering Reports
Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

The Guide to Successful Mac Mobile Deployments in Your Enterprise
sponsored by JAMF Software
WHITE PAPER: This expert guide highlights five important steps needed to successfully deploy Mac computers in your organization, utilizing user-friendly deployment programs.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

JAMF Software

MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Sleeping Android: the danger of dormant permissions
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

When Business is the App, the App is the Business: Securing Enterprise Apps
sponsored by IBM
WHITE PAPER: In this report, you will learn the key security dangers enterprise mobile apps face, and find out how to eliminate these threats them in your app-driven business. Access this comprehensive white paper now to optimize the use of apps in your business.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


Solutions for Healthcare and HIPAA Compliance
sponsored by Citrix
WHITE PAPER: This guide reviews how new mobile technologies can help improve care using modern applications.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


Overcoming the Big Disconnect in Web Security
sponsored by Akamai
WHITE PAPER: This white paper explains why partnering with a security service provider is an effective way to tackle many of the security issues enterprises face. Learn how to adapt to the shifting threat landscape by locating a platform that provides cloud security solutions.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


When it Comes to File Sync-and-Share, Security is Vital
sponsored by Linoma Software
EGUIDE: This e-guide discusses 3 approaches to file sync-and-share strategies, and the security concerns associated. Access now to find out how you can share your files while remaining confident in their security.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Linoma Software

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement