Business of Information Technology  >   Business Management  >   Content Management  >  

Internet Content Monitoring

RSS Feed   
Internet Content Monitoring Reports
 
Security's New Frontier: The Cloud
sponsored by Cisco Umbrella
EBOOK: By 2018, SaaS usage is expected to increase 70% and security can't wait any longer. Inside this e-book, uncover how to securely adopt and use the cloud to better manage security policies and gain visibility beyond the perimeter.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Cisco Umbrella

Honda Dealer Recovers from Ransomware
sponsored by Acronis
CASE STUDY: Take a look at this Honda dealership case study on how they overcame data loss and malware attacks by leveraging the cloud.
Posted: 16 Aug 2017 | Published: 31 Aug 2016

Acronis

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

The Cognitive Step — How Search Will Improve
sponsored by Attivio, Inc.
WHITE PAPER: This paper explores the shift being driven by increased demand and expectations among those who rely on search-based solutions, and the emerging technologies that are helping solve big data challenges.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Attivio, Inc.

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox

Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Posted: 09 Jun 2009 | Published: 06 May 2009

Symantec Corporation

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Micron Technology

Enable Enterprise Collaboration with a File Sharing Plan
sponsored by SkySync
WHITE PAPER: Today's workforce requires a file sharing plan that enables enterprise-wide collaboration, but this could put your data in jeopardy. This white paper examines the top security threats surrounding file sharing and how your organization can lay out a roadmap to navigate these challenges, enabling safe collaboration with hybrid cloud.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

SkySync

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement