Business of Information Technology  >   Business Management  >   Content Management  >  

Content Monitoring

RSS Feed   
Content Monitoring Reports
 
Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

The Benefits of a Software Defined Secure Branch with Versa Networks
sponsored by Verizon
WHITE PAPER: Adopting software defined secure branch gives organizations a network landscape that is built for the digital enterprises of today. In this white paper, discover the benefits of a software defined secure branch with Versa Networks.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Verizon

Mobile Device Security Overview
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchSecurity.com

6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

4 Critical Principles of Enterprise Security
sponsored by Smartsheet
RESEARCH CONTENT: What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Smartsheet

Empowering Big Data in a Data-driven Economy
sponsored by Comforte AG
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Comforte AG

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement