Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Filtering

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Filtering Reports
 
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
sponsored by SearchSecurity.com
EGUIDE: Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by SearchSecurity.com
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchSecurity.com

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

HP 3Par Secure Service Architecture
sponsored by HPE and Intel®
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HPE and Intel®

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Vericept Data Loss Prevention Solution
sponsored by Vericept Corporation
PRODUCT LITERATURE: Discover how the only outbound content control solution enables corporations and organizations to gain complete visibility into all insider risk whether inadvertent or malicious, and to control violations before they occur.
Posted: 20 Jul 2007 | Published: 01 Jul 2007

Vericept Corporation

The New BYOD: Best Practices for a Productive BYOD Program
sponsored by VMware
WHITE PAPER: This white paper demonstrates how to leverage BYOD as a tool to drive mobile accessibility in your business. It outlines the basic measures that must be taken to dramatically boost productivity. Read on now to learn how to transition from corporate-owned devices to a BYOD-centric workplace.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

VMware

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement