Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Filtering Software

RSS Feed   
ALSO CALLED: Web Blocking Software, Filtering Software, Web Filtering Tools, Internet Nanny, Web Filtering Software, Internet Blocking Software, Blocking Software
DEFINITION: Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content. Examples include Cybersitter, N2H2, Netnanny, Surfwatch, and Wisechoice. This kind of software is designed to restrict an individual's ability to send or receive certain types of information, and for that reason its use (in public libraries, for example) is a contentious issue. Organizations  … 

Internet Filtering Software definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Internet Filtering Software White Papers (View All Report Types)
26 - 50 of 508 Matches Previous Page  |  Next Page
A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

A Comprehensive Guide to Authentication Technologies and Methods
sponsored by Thales
WHITE PAPER: Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.
Posted: 28 Apr 2020 | Published: 31 Mar 2020

Thales

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Thales
WHITE PAPER: Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

A Hybrid Cloud Blueprint with Citrix SD-WAN for Microsoft Azure
sponsored by Citrix
WHITE PAPER: As organizations migrate their application workloads to the cloud, the network needs to undergo a shift to align with this new paradigm. This is where SD-WAN can help. In this white paper, explore the benefits of Citrix SD-WAN in terms of application experience, security and cloud on-ramp automation.
Posted: 29 May 2020 | Published: 29 May 2020

Citrix

A Massively Scalable Approach to Network Security
sponsored by SonicWall
WHITE PAPER: Learn about a new approach securing your network in this white paper. It explores a network-based model for scaling a next-generation firewall (NGFW) that can help provide better performance, increase resiliency and lower TCO.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

SonicWall

A Network for Blazing Fast and Secure Content Experiences
sponsored by Cloudflare
WHITE PAPER: As user expectations for speed, stream quality, and image quality grow, performance becomes more crucial for growing media and entertainment companies. At the same time, companies must keep their data secure. Download this white paper to learn how you can improve your security posture while boosting performance.
Posted: 04 May 2020 | Published: 04 May 2020

Cloudflare

A Silver Lining for Security: Cybercrime is on the Rise, but the Cloud Offers Protection
sponsored by HP Inc
WHITE PAPER: Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.
Posted: 18 Mar 2020 | Published: 31 Dec 2019

HP Inc

Accelerate Innovation with Automated Security
sponsored by Sonatype
WHITE PAPER: The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

Sonatype

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Adopting a Zero-Trust Approach Reduces Risk and Lets Your Enterprise Thrive
sponsored by BT
WHITE PAPER: Attackers are constantly looking for weaknesses to exploit — and with cloud and hosted services, these weak points can lie outside your network perimeter. In this white paper, learn why organizations are increasingly taking a zero-trust approach, focusing on where the gaps are and how people might exploit them.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

BT

Advanced Authentication Buyers Guide
sponsored by HID Global
WHITE PAPER: With cyberattacks targeting credentials on the rise, it’s become paramount to include authentication and other identity management tools to your security program. This buyers guide identifies key considerations for organizations to look at when selecting an advanced authentication offering and vendor. Read on to get started.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

HID Global

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

Advantage, Network Metadata: How to Enhance Efficiency in Incident Investigations Without PCAP
sponsored by Gigamon
WHITE PAPER: For a long time network security teams have relied on using packet captures (PCAPs) as the go-to approach for incident investigation. Yet, PCAP can be slow, labor intensive and inefficient. Read this new technology brief and discover how to enhance investigation efficiency without using PCAP by leveraging the advantages of metadata capture.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Gigamon

Advantages of Using A Hosted Payment Page
sponsored by SFG
WHITE PAPER: For organizations interested in selling their products or services online, establishing payment processing and ensuring PCI compliance can be an enormous barrier to entry. To ease the workload, organizations are turning to hosted payment pages. This whitepaper explores how hosted pages work and highlights their key benefits.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

SFG

AI For Cybersecurity
sponsored by IronNet
WHITE PAPER: With the cost and frequency of cyberattacks expected to continue to rise, what can organizations do to meet these sophisticated threats? This white paper breaks down how artificial intelligence, when used effectively, can strengthen threat detection and response. Read on to learn more.
Posted: 23 Apr 2020 | Published: 16 Apr 2020

IronNet

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?
sponsored by IBM
WHITE PAPER: This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.
Posted: 14 May 2008 | Published: 01 May 2008

IBM

A Guide to Accelerating Business Value for Microsoft Environments
sponsored by EMC Corporation
WHITE PAPER: In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.
Posted: 10 Mar 2008 | Published: 01 Oct 2007

EMC Corporation

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

Hewlett Packard Enterprise

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Acronis
26 - 50 of 508 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info