Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Filtering Software

RSS Feed   
ALSO CALLED: Web Blocking Software, Filtering Software, Web Filtering Tools, Internet Nanny, Web Filtering Software, Internet Blocking Software, Blocking Software
DEFINITION: Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content. Examples include Cybersitter, N2H2, Netnanny, Surfwatch, and Wisechoice. This kind of software is designed to restrict an individual's ability to send or receive certain types of information, and for that reason its use (in public libraries, for example) is a contentious issue. Organizations  … 

Internet Filtering Software definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Internet Filtering Software White Papers (View All Report Types)
151 - 175 of 342 Matches Previous Page  |  Next Page
Intergrated Mobile Security for Small and Midsize Businesses
sponsored by SearchSecurity.com
WHITE PAPER: This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

IBM FlashSystem 900: Value at the Core
sponsored by IBM
WHITE PAPER: Access this white paper to learn how flash storage can boost storage performance and speed up processing times. Read on to learn about the technology behind a new flash storage system.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

IBM

IBM PureFlex Systems with VMWare: Cloud-ready virtualization with the flexibility of an expert integrated system
sponsored by IBM
WHITE PAPER: This resource explores the benefits of combining IBM PureFlex System with VMware. Inside, discover how you can implement a reliable cloud-ready infrastructure with integrated hardware and software designed for efficient virtualization. Discover if this combination will bring the benefits your organization needs.
Posted: 15 Jul 2013 | Published: 30 Apr 2012

IBM

IBM Rational Team Concert Evaluation Guide
sponsored by IBM
WHITE PAPER: Explore the comprehensive features and functions that the Rational Team Concert tool offers, including integrated work item tracking, source control, continuous builds, agile planning and reporting, and more.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

IBM

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC link software appliances ease cloud application deployment
sponsored by SUSE
WHITE PAPER: Like most new technology, cloud computing does not come without a certain level of complexity. This white paper evaluates the key drivers for cloud computing and explains how certain software appliances can simplify cloud implementation and accelerate your initiative.
Posted: 13 Jun 2012 | Published: 01 Jan 2012

SUSE

IDC White Paper: Diskless PCs: The Evolution of Enterprise PCs
sponsored by DellEMC and Intel®
WHITE PAPER: Diskless PCs used in conjunction with image streaming software can provide a PC performance and compatibility experience that is identical to that of a standalone machine, but with all the benefits that centralized environments enable.
Posted: 23 Jan 2008 | Published: 01 Jun 2007

DellEMC and Intel®

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Increasing Data Center Density While Driving down Power and Cooling Costs
sponsored by Intel Corporation
WHITE PAPER: This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
Posted: 24 Jul 2008 | Published: 01 Jun 2006

Intel Corporation

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Integrated Change and Release Management: A Defect Resolution Use-case Scenario
sponsored by IBM Software Group
WHITE PAPER: This paper introduces the IBM Rational change and release management solution to help companies streamline and accelerate their software and systems delivery lifecycle.
Posted: 15 Feb 2008 | Published: 01 Oct 2007

IBM Software Group

Integrated Solutions for Defect and Project Tracking
sponsored by TechExcel
WHITE PAPER: This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
Posted: 05 Jun 2008 | Published: 05 Jun 2008

TechExcel

Interpol, Entrust Develop Advanced Multipurpose SmartCard
sponsored by Entrust, Inc.
WHITE PAPER: See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL.
Posted: 25 Jul 2012 | Published: 30 Nov 2011

Entrust, Inc.

Is Time to Market King?
sponsored by IBM
WHITE PAPER: The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

IBM

IT Consolidation with VMware and Dell EqualLogic iSCSI SANs
sponsored by Dell and VMware
WHITE PAPER: Dell EqualLogic™ PS Series iSCSI SANs help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.
Posted: 14 May 2009 | Published: 14 May 2009

Dell and VMware

It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters
sponsored by SAP America, Inc.
WHITE PAPER: Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

SAP America, Inc.

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

Keeping It Simple: How to Protect Growing VMware Environments
sponsored by BakBone
WHITE PAPER: VMware has evolved to meet the needs of its growing customer base and has built an excellent foundation for data protection. It's Designed to work in conjunction with third-party backup software applications.
Posted: 16 Jul 2008 | Published: 01 Jul 2008

BakBone
151 - 175 of 342 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info