Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed   
Filtering Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

DAST vs SAST: A Case for Dynamic Application Security Testing
sponsored by Acunetix
RESOURCE: When it comes to performing a security test for business applications, most security teams have a preference: DAST or SAST. However, both play a key role in effective security testing strategies. Read this article to learn more about the strengths of implementing the DAST method, and how to address its weaknesses.
Posted: 28 May 2020 | Published: 06 Mar 2020

Acunetix

Learn How to Enhance Visibility and Early Detection by Using the SOC Triad
sponsored by Vectra Networks
WEBCAST: In this podcast, join security experts and business leaders from Cybereason, Vectra and Splunk as they discuss how to enhance visibility and early detection by using the SOC triad. But what is the SOC triad? Give the podcast a listen to discover the 3 components of the SOC triad and learn how to operationalize it.
Posted: 29 May 2020 | Premiered: Apr 24, 2020

Vectra Networks

How Can A Risk Management Platform Support Your Business During A Crisis?
sponsored by Ostendio
RESOURCE: While organizations may be anxious to return to work, it’s critical to keep in mind the lessons learnt about maintaining security and productivity during a crisis. Developing a solid crisis management plan can help with responding to future incidents. Read this article to uncover 6 key steps to help you get started.
Posted: 04 Jun 2020 | Published: 29 Apr 2020

Ostendio

Your WAN security: Top 3 threat types and how to outsmart them
sponsored by Cisco
RESOURCE: As your WAN evolves, you might need to enable direct Internet access at the branch, secure connectivity to the cloud, and protect all users and devices from threats without compromising the user experience. Cisco SD-WAN can help you handle all these demands without ever leaving security behind. Download this resource to learn more.
Posted: 27 May 2020 | Published: 27 May 2020

Cisco

A Buyer's Guide to Cloud Security
sponsored by Forcepoint
WHITE PAPER: Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

Secure, Simply Deployed Network for Remote Workers
sponsored by CradlePoint
DATA SHEET: An unprecedented number of people are working from their homes today. As a result, employees are using their home networks and consumer security solutions while competing with household members for bandwidth. This puts company data and assets at risk. In this brief, learn how Cradlepoint can help get your employees connected and protected.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

CradlePoint

Supermicro Intelligent Retail Edge
sponsored by Super Micro
WHITE PAPER: In this white paper, learn how Supermicro’s Intelligent Retail Edge can help enable retailers to simplify and automate the delivery and management of applications, data, networking, and infrastructure across their distributed locations in a flexible, reliable and secure manner.
Posted: 26 May 2020 | Published: 31 May 2020

Super Micro

Negotiating with SaaS Vendors
sponsored by ClearEdge
WHITE PAPER: Negotiating with your SaaS vendors involves more than a test of wills. This resource outlines 4 crucial components to building a case to achieve a great deal. Discover a 9-point checklist to assess and address your degree of negotiating leverage, the biggest obstacle to success on your next deal (avoid this simple but common mistake), and more.
Posted: 28 May 2020 | Published: 28 May 2020

ClearEdge

Application Delivery Solutions for Cloud Native Applications
sponsored by Citrix
WHITE PAPER: In this white paper, learn how Citrix’s application delivery solutions can help enable you to deploy, run and troubleshoot microservices-based applications faster.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info