Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Filtering Software

RSS Feed   
ALSO CALLED: Web Blocking Software, Filtering Software, Web Filtering Tools, Internet Nanny, Web Filtering Software, Internet Blocking Software, Blocking Software
DEFINITION: Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content. Examples include Cybersitter, N2H2, Netnanny, Surfwatch, and Wisechoice. This kind of software is designed to restrict an individual's ability to send or receive certain types of information, and for that reason its use (in public libraries, for example) is a contentious issue. Organizations  … 

Internet Filtering Software definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Internet Filtering Software White Papers (View All Report Types)
126 - 150 of 508 Matches Previous Page  |  Next Page
CyberArk Alero
sponsored by Cyber-Ark Software
WHITE PAPER: As businesses continue to rely on remote vendors to manage portions of their IT infrastructure, providing privileged access to off-site staff becomes increasingly critical & traditional services aren’t designed to meet this challenge. Read on to learn more about a service designed to provide secure infrastructure access to remote devices.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cyber-Ark Software

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

DAN for ITS Whitepaper
sponsored by ALE USA
WHITE PAPER: In this white paper, learn how Alcatel-Lucent Enterprise can help provide IoT-ready network technology that enables state DOTs to get the most from next generation Intelligent Transportation Systems to accomplish their missions.
Posted: 07 May 2020 | Published: 07 May 2020

ALE USA

Data Privacy at Automox: Why SaaS Applications Deliver Superior Security
sponsored by Automox
WHITE PAPER: Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


Data Security in today's borderless, multi-cloud landscape
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

Decisive Technology for Decisive Moments
sponsored by Thales
WHITE PAPER: Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Delivering Always on Experiences Gamers Will Love
sponsored by Nokia
WHITE PAPER: A great cloud gaming experience depends on networks that deliver exceptional low latency for gamers needing to know what’s happening in the game, in a split-second. In this white paper, learn how multi-dimensional network analytics and insights, peering engineering and DDoS protection can help radically improve experiences for gamers.
Posted: 14 May 2020 | Published: 14 May 2020

Nokia

Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER: As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

Duo Security's Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
WHITE PAPER: As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.
Posted: 01 May 2020 | Published: 01 May 2020

Duo Security

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Dell Wyse Datacenter for Citrix Reference Architecture
sponsored by Dell
WHITE PAPER: Learn how to deliver virtual desktops via XenDesktop 7.1 on Windows Server Hyper-V 2012 R2 or VMware vSphere 5.
Posted: 25 Nov 2014 | Published: 30 May 2014

Dell

Dell™ PowerVault™ MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Disaster Preparedness: Is there a hole in your disaster recovery plan?
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
Posted: 04 Jan 2012 | Published: 04 Jan 2012

Iron Mountain

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008

IBM

Dynamic Business - From Aspiration to Reality
sponsored by Microsoft India
WHITE PAPER: This resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
Posted: 19 Dec 2013 | Published: 19 Mar 2013

Microsoft India

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Dynamic Initiators That Give You the Control You Need
sponsored by MVS Solutions
WHITE PAPER: This paper discusses the initiator requirements, and how ThruPut Manager optimizes and automates batch job queuing and initiation.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

MVS Solutions
126 - 150 of 508 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info