Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Filtering Software

RSS Feed   
ALSO CALLED: Web Blocking Software, Filtering Software, Web Filtering Tools, Internet Nanny, Web Filtering Software, Internet Blocking Software, Blocking Software
DEFINITION: Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content. Examples include Cybersitter, N2H2, Netnanny, Surfwatch, and Wisechoice. This kind of software is designed to restrict an individual's ability to send or receive certain types of information, and for that reason its use (in public libraries, for example) is a contentious issue. Organizations  … 

Internet Filtering Software definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Internet Filtering Software White Papers (View All Report Types)
76 - 100 of 433 Matches Previous Page  |  Next Page
COMFORTE AG SECUREDPS: PCI DSS TECHNICAL ASSESSMENT
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

COMFORTE SECURDPS: ENTERPRISE SOLUTION FOR CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

COMFORTE SECURDPS: ENTERPRISE SOLUTION FOR GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Creating a Culture of Security
sponsored by HelpSystems
WHITE PAPER: You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

Customer attitudes to digital identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

CW+: IDC Report - How to manage documents in the enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: In recent years C-level executives in many of the world's largest and most successful organizations have been forced to introduce a wide range of cost-cutting measures as macroeconomic forces continue to create a challenging and uncertain trading environment.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

Cybersecurity in the Remote Work Era: A Global Risk Report
sponsored by Keeper Security Inc
WHITE PAPER: One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Keeper Security Inc

Cybersecurity Is Improving, But Is It Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Cloud Computing and SaaS: A Practical Guide for Financial Professionals
sponsored by Host Analytics, Inc
WHITE PAPER: This white paper looks at cloud-computing and software-as-a-service (SaaS) technologies and what you need to know about these emerging trends.
Posted: 12 Apr 2012 | Published: 16 Sep 2010

Host Analytics, Inc

Collaborative software delivery: improving software quality with better lifecycle management
sponsored by IBM
WHITE PAPER: Read this white paper and learn how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management (ALM) solution designed to support collaboration across distributed agile development teams.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Composite applications - Break the delivery logjam with HP Service Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This whitepaper takes a look at service virtualization, and how it can speed application development by replicating unavailable components, and improve quality control with multiple scenario testing.
Posted: 07 Nov 2013 | Published: 03 Dec 2012

Hewlett Packard Enterprise

Comprehensive Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This white paper details conprehensive security for today's changing data centers including virtualized network and cloud computing.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM and Juniper

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Creating your own future proof Private Cloud with a Software-Defined Datacentre solution
sponsored by OVH
WHITE PAPER: One of the most promising paths to virtualization continues to be a software-defined data center (SDDC). A SDDC gives your organization access to the benefits of the private cloud while also delivering a unified configuration of applications, resources, and infrastructure. Read OVHcloud’s white paper to better understand the basics of the SDDC now.
Posted: 18 Dec 2019 | Published: 18 Dec 2019

OVH

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix
76 - 100 of 433 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences