Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Filtering Software

RSS Feed   
Filtering Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

COVID-19 Challenges for the Borderless Enterprise
sponsored by Infoblox
ANALYST REPORT: Prior to the COVID-19 crisis, only 21% of organizations globally had over half of their workforce working remotely. However, the COVID-19 crisis has forced companies to become “borderless,” pushing these numbers up. Download this research report to uncover more key findings from a recent survey on COVID-19 challenges for the borderless enterprise.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Infoblox

Using In-Vehicle Networks to Securely Connect Modern Public Transit Technologies
sponsored by CradlePoint
DATA SHEET: Today, public transportation agencies are finding more ways to use connected devices and applications in vehicles. However, this depends on highly reliable connectivity. In this brief, learn how Cradlepoint’s NetCloud Service for Mobile can help provide the enterprise capabilities that public transit agencies need.
Posted: 14 Sep 2020 | Published: 07 Aug 2020

CradlePoint

Changing the Rules of Ransomware
sponsored by Dell SecureWorks
VIDEO: Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

Dell SecureWorks

HIPAA-Compliant Cloud: Avoid the 7 Deadly Sins
sponsored by Armor
WHITE PAPER: Cloud capabilities are skyrocketing in popularity across all industries, and healthcare is no exception. However, the requirements of HIPAA make cloud migration a bit more challenging for healthcare industries. Read this white paper to unlock the 7 deadly sins of building HIPAA-compliant clouds.
Posted: 01 Oct 2020 | Published: 31 Mar 2020

Armor

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

The Business Executive’s Guide to Cybersecurity
sponsored by Dell SecureWorks
WHITE PAPER: The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Dell SecureWorks

Microsoft 365 Endpoint DLP: Is it Ready for the Enterprise?
sponsored by InteliSecure
WHITE PAPER: Organizations are in dire need of a reliable and simple way to protect their endpoints – in an effort to meet this growing need, Microsoft responded with their new Endpoint DLP tool, which was announced at a virtual event earlier this year. Read this e-guide learn more about the new Endpoint DLP tool.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

InteliSecure

The Best Practices for Cloud Security Operations on AWS
sponsored by AllCloud
EBOOK: When it comes to cloud migrations, it’s important for organizations to recognize that they still own the responsibility of securing their cloud-based data and applications. To help you get started, this e-book provides a closer look at 6 areas to focus on for effective cloud security and overviews how to securely migrate to the cloud on AWS.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

AllCloud

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info