Business of Information Technology  >   Business Management  >   Content Management  >  

Internet Content Monitoring

RSS Feed   
Internet Content Monitoring Reports
 
Securing Innovation
sponsored by Micro Focus
WHITE PAPER: Businesses must adopt new technologies, innovate with new products, and find new partners to expand their business. But, all of these activities increase security risk. If these risks are not addressed, they can cause damage to the company. In this white paper, learn how Micro Focus security tools can help secure your data.
Posted: 05 Feb 2019 | Published: 31 Jul 2018

Micro Focus

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
sponsored by SearchSecurity.com
EGUIDE: Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

ASICS Automates Incident Management and Resolution With Real-Time Log Analysis
sponsored by Splunk Services UK Ltd
CASE STUDY: In order for ASICS to combat cyberthreats and address incidents at the very moment they occur, ASICS required a central platform to manage, correlate and analyze logs generated from multiple systems. In this case study, learn about the ASICS' experience using Splunk Enterprise.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk Services UK Ltd

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems

Security through Maturity: A Brief on Securing iSCSI Networks
sponsored by DellEMC and Intel®
WHITE PAPER: Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
Posted: 13 May 2009 | Published: 13 May 2009

DellEMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement