Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Blocking Software

RSS Feed   
Internet Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

How 1 Hospital Transformed Network Security
sponsored by Micro Focus
CASE STUDY: When network performance fell at a major North American hospital, it was a sign that years of IT security neglect had led to serious problems. The hospital had developed a reputation as a soft target and experienced daily network attacks. Read this case study to learn how this hospital began addressing threats before they become a problem.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Micro Focus

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

5 Reasons Corelight Gives You Better Data for Incident Response and Threat Hunting
sponsored by Corelight
PRODUCT OVERVIEW: Download this white paper to learn about a product that can give you a holistic view of your network and turn network traffic into high-fidelity data for analysis.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Corelight

Case Study: Expanding a Network of Global Collaboration
sponsored by Egnyte
CASE STUDY: Download this case study to learn how partnering with Egnyte allowed Aerohive Networks to empower worldwide collaboration, while keeping content safe and secure with backups.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

Egnyte

The State of Software Security: Volume 9
sponsored by Veracode, Inc.
RESEARCH CONTENT: In this report, get a clear picture of software security risk, uncover how long it takes for different types of vulnerabilities to be fixed, and to understand why certain risks linger for as long as they do.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

Veracode, Inc.

Cloud Transformation Requires New Ways of Thinking
sponsored by Zscaler
WHITE PAPER: Download this white paper to learn about a program that enables you to shift from a hub-and spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

Zscaler

Siemens on their Secure Cloud Transformation with Zscaler
sponsored by Zscaler
WEBCAST: Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.
Posted: 03 Jan 2019 | Premiered: Jan 3, 2019

Zscaler

How to Migrate the Insider Threat
sponsored by Quest
WHITE PAPER: More and more IT pros are getting wise to the true nature of the insider threat. They understand that the insider threat is much more than a disgruntled admin sabotaging systems or stealing data. This white paper explains how organizations can up their game. It details 3 key best practices that will help you mitigate the insider threat.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

Quest

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement