Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security Reports
 
E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

From Enterprise Search to Content Analytics
sponsored by IBM
WHITE PAPER: Enterprises must retrieve and interpret rising amounts of data. IBM Watson Explorer is now accelerating insights and converting search into analytics for actionable insight. Inside, learn about a few real-world success stories, including how one organization reduced document search time from 10 hours to 60 seconds.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

IBM

Customer Story: Kuwait Petroleum Corporation
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

IBM

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
sponsored by Astaro
CASE STUDY: Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

Mastering Mobile Application Management: How to Adopt MAM
sponsored by SearchMobileComputing
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

SearchMobileComputing

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement