Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security Reports
 
Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Sophos, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement