Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed   
Filtering Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

TOPICS: 
SearchSecurity.com

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by CoreLight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
CoreLight

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
ComputerWeekly.com

How You Can Make Incident Response Faster and More Efficient
sponsored by CoreLight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

TOPICS: 
CoreLight

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

TOPICS: 
Cisco Umbrella

Network Virtualization's Hidden Gem: Application Security
sponsored by VMware and Arrow
WHITE PAPER: Who should be looking at network virtualization as a source of application infrastructure security? Surprisingly—almost every enterprise. Find out more about how network virtualization can provide a holistic view of what's happening to your data, and potential threats in this white paper.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 

SD-WAN Use Case Profile Matrix: What's Driving SD-WAN Adoption?
sponsored by Telstra
WHITE PAPER: In this white paper, explore 6 reasons to switch to SD-WAN, and discover how different sectors are using the technology.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

TOPICS: 
Telstra

Siemens on their Secure Cloud Transformation with Zscaler
sponsored by Zscaler
WEBCAST: Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.
Posted: 03 Jan 2019 | Premiered: Jan 3, 2019

TOPICS: 
Zscaler

Driving Radical Customer Service Innovation
sponsored by ServiceNow
EBOOK: Customer service has changed in recent years. Customers can voice their opinions easily over the internet, have more options, can leave vendors more easily and are demanding high-level customer service. Read this e-book to learn about how you can drive customer service innovation within your organization and keep your customers satisfied.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

TOPICS: 
ServiceNow

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

TOPICS: 
Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement