Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed   
Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

The Forrester Wave: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Internal Firewalls
sponsored by VMware
EBOOK: Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

VMware

Simulating The Latest Threats And Techniques With The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Cloud networks: Shifting into hyperdrive
sponsored by Barracuda
RESEARCH CONTENT: As organizations continue to radically transform and modernize their infrastructures, public cloud usage continues to soar. However, the evolution of public cloud isn’t without its own set of operational constraints and security concerns. Read this research report for a deep dive into modern public cloud networks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Barracuda

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Is the SD-WAN home office here to stay?
sponsored by SearchNetworking.com
EGUIDE: While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

The Optimal SASE Enabling Platform
sponsored by Apcela
RESOURCE: Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt secure access service edge (SASE). What do you need to know about SASE and how it will influence your network architecture? Examine this 3-part guide, provided by Apcela, to see why SASE is the next step in the digital evolution.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

Apcela

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences