Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Blocking Software

RSS Feed   
Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Exploring the SD-WAN Business Case
sponsored by 128 Technology
ANALYST REPORT: With the right product, the basic business case for SD-WAN can be expanded significantly. However, that doesn’t mean that making an SD-WAN business case is easy. In this report, explore a cost model of enterprise networking to assess the way SD-WAN deployments have impacted costs at many organizations.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

128 Technology

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

A Silver Lining for Security: Cybercrime is on the Rise, but the Cloud Offers Protection
sponsored by HP
WHITE PAPER: Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.
Posted: 18 Mar 2020 | Published: 31 Dec 2019

HP

Two Years of Active Cyber Defense Infographic
sponsored by Nominet
RESOURCE: Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.
Posted: 31 Mar 2020 | Published: 31 Mar 2020


Gaining a Hacker's Perspective of API Vulnerabilities
sponsored by Ping Identity Corporation
WEBCAST: While APIs have enabled organizations to modernize their business operations, most organizations feel that they are also an area of potential weakness. This webinar aims to better understand today’s challenges and how to mitigate them by examining key API threats through the perspective of a hacker.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Ping Identity Corporation

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions
sponsored by Radware
DATA SHEET: Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

Intent-Based Networking Explained
sponsored by Cisco Systems, Inc.
VIDEO: In this short video, explore the basics of intent-based networking (IBN) and how to benefit from IBN solutions.
Posted: 20 Mar 2020 | Premiered: 01 Oct 2019

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info