Business of Information Technology  >   Business Management  >   Content Management  >  

Web Content Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security Reports
 
4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Protecting Against the New Wave of Web Threats
sponsored by BlueCoat
ANALYST REPORT: This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings.
Posted: 15 May 2009 | Published: 15 Jan 2009

BlueCoat

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Micron Technology

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement