Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Monitoring Reports
 
Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: No risks can be taken when it comes to healthcare information storage. This is deterring many healthcare IT professionals from taking advantage of cloud storage opportunities. Read on to uncover four security tips that will keep your healthcare cloud storage in compliance with HIPAA standards.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

The New BYOD: Best Practices for a Productive BYOD Program
sponsored by VMware
WHITE PAPER: This white paper demonstrates how to leverage BYOD as a tool to drive mobile accessibility in your business. It outlines the basic measures that must be taken to dramatically boost productivity. Read on now to learn how to transition from corporate-owned devices to a BYOD-centric workplace.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

VMware

Mobile First Financial Services
sponsored by MobileIron
WHITE PAPER: The financial services industry has found that mobility is the big stake feature that will propel organizations forward or leave them in the dust. Read on to learn about a mobile service designed with the cost and security concerns of the finance industry in mind.
Posted: 31 May 2016 | Published: 25 May 2016

MobileIron

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

ComputerWeekly.com

Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions
sponsored by SAP America, Inc.
WHITE PAPER: This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Posted: 01 Feb 2008 | Published: 01 Jan 2007

SAP America, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement