Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed   
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 

Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Secure Content Management Reports
1 - 25 of 108 Matches Previous Page  |  Next Page
Closting the CX Gap: Customer Experience Trends Report 2019
sponsored by Acquia, Inc.
RESEARCH CONTENT: There's a 66% chance that you're paving the way to an early brand death. In this global report, explore how brands can overcome fatal CX barriers by closing the gap between marketer and consumer CX expectations. Read on to discover how.
Posted: 11 Dec 2018 | Published: 11 Dec 2018

Acquia, Inc.

Mobility: Transforming the Mobile Device from a Security Liability into a Business Asset
sponsored by Ping Identity Corporation
WHITE PAPER: There's a tangible value in allowing employees to get work done during their commutes but, the inherent nature of employee-owned devices used within the workplace is a legitimate concern for IT. However, the pillars discussed in this whitepaper have been critical success factors to getting the most out of your mobile initiatives.
Posted: 11 Dec 2018 | Published: 31 Jul 2016

Ping Identity Corporation

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. They decided a Managed Detection and Response (MDR) would be the optimal approach and Artic Wolf's SOC service fit their requirements. After deploying, the IT team at Maslon saw exceptional results.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats however, they can be very expensive to build and extremely difficult to manage. This white paper will evaluate the costs and features of SOC-as-a-service and DIY SOC to help you make an informed decision.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

MSSP Buyer's Guide: For Security Orchestration & Automation Platforms
sponsored by Siemplify
WHITE PAPER: As the MSSP market continues to flourish, customer demand and intense competition places margins under constant pressure. This guide outlines the challenges faced by MSSPs and sets out the criteria to consider when presented with orchestration as a solution. It also provides direction regarding the implantation of orchestration.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Siemplify

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Document and Endpoint Security: Checklists and Discussion Guides
sponsored by Xeretec
WHITE PAPER: Download this white paper to review tips on protecting business documents and securing the multifunction printers and devices that create them.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Xeretec

Adobe Creative Cloud for enterprise security overview
sponsored by Adobe Inc
WHITE PAPER: Download this white paper to learn about the security features integrated into Adobe Creative Cloud, such as access control, encryption, identity management and much more.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Adobe Inc

Straight Talk on Protecting Your Sensitive Content
sponsored by Egnyte
VIDEO: Watch this webcast to learn about Egnyte Protect, a feature that integrates with content management suite, Egnyte Connect, and helps you reduce the risk of a breach by safeguarding confidential content in a matter of minutes; regardless of where it's stored, or how it's accessed.
Posted: 26 Oct 2018 | Premiered: 23 Oct 2018

Egnyte

Dropbox Business: Getting the Most From Collaboration
sponsored by Dropbox
WHITE PAPER: Download this white paper to learn about leading enterprise content management suite Dropbox Business, and how it can help ensure secure collaboration across applications, tools, devices, and operating systems.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

Dropbox

Egnyte as a File Server Replacement: Product Features & Capabilities
sponsored by Egnyte
WHITE PAPER: Read this white paper to learn about a content services platform that enables you to collaborate securely on content from anywhere using a desktop, web or mobile device—without a VPN
Posted: 26 Oct 2018 | Published: 26 Oct 2018

Egnyte

Driving Radical Customer Service Innovation
sponsored by ServiceNow
EBOOK: Customer service has changed in recent years. Customers can voice their opinions easily over the internet, have more options, can leave vendors more easily and are demanding high-level customer service. Read this e-book to learn about how you can drive customer service innovation within your organization and keep your customers satisfied.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ServiceNow

How to Secure Your Content in the Cloud with Box
sponsored by Box
WHITE PAPER: Having a content management suite is vital for worker mobility and collaboration across the enterprise. But how do you keep it secure? Download this eBook for an overview of how Box secures content and achieves compliance based on 4 main tenets.
Posted: 19 Sep 2018 | Published: 19 Sep 2018

Box

Making Sense of Mismatches
sponsored by Riskified
WHITE PAPER: In some cases, the presence of a mismatch translates to an instant red flag. But that is not always the case. This eBook provides insight into the most common types of mismatches found in good orders, including a deeper look at industry specific patterns, and how to handle them.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

Riskified

Secure Collaboration That Teams Love Using
sponsored by Dropbox
WEBCAST: Collaboration tools are essential to your organization, and you're constantly using them to share important documents, but how secure are they? Download this webcast to learn about Dropbox, and how the collaboration tool can encourage teamwork while complying with security requirements.
Posted: 26 Sep 2018 | Premiered: Sep 26, 2018

Dropbox

Getting the Most From Collaboration
sponsored by Dropbox
WHITE PAPER: How do you combine the simplicity of cloud collaboration apps with enterprise-grade security? Download this white paper for an overview of leading collaboration platform, Dropbox Business, which enables organizations to gain control of shared data while meeting the security mandates that challenge enterprises of all sizes.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

Dropbox

Collaboration and Beyond: Create and Store Securely With Dropbox
sponsored by Dropbox
WHITE PAPER: Download this white paper to learn about leading collaboration platform Dropbox Business, which helps companies reduce risk while promoting productivity by providing 1 platform to create, edit, and store content securely.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

Dropbox

Powering the Digital Workplace with Box and Office 365
sponsored by Box
EBOOK: Read this white paper for to learn how leading content management provider, Box and Office 365 can help improve the experience for end users, IT, security and legal and compliance teams by providing 1 place to create, collaborate, edit and store both Microsoft and non-Microsoft files.
Posted: 25 Sep 2018 | Published: 25 Sep 2018

Box

Vendor Breakdown: Which Secure Email Gateway is Right for You?
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: Security and risk management leaders continue to rely on the secure email gateway (SEG) as a critical component of their security strategy in an evolving threat environment. But which SEG is the right one for you? Download this Gartner Market Guide for SEGs to compare vendor capabilities and see which tool is best for your organization.
Posted: 07 Sep 2018 | Published: 03 May 2017

Proofpoint, Inc.

Managing Security on Shared Resources
sponsored by WinMagic
WEBCAST: Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.
Posted: 15 Aug 2018 | Premiered: Apr 3, 2017

WinMagic

Mid-year Threat Research Report: Hacking Trends and Prevention Tips
sponsored by Zscaler
WHITE PAPER: The Zscaler cloud serves more than 5,000 organizations across 100 data centers, processing over 35 billion requests a day, making it a target for hackers. Download this report to learn about current threat trends and what you can do to prevent hacking and strengthen security.
Posted: 08 Aug 2018 | Published: 31 Jul 2017

Zscaler

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Splunk

Pure Storage Case Study: Man AHL
sponsored by Pure Storage
CASE STUDY: Download this case study to see how investment business Man AHL delivered the massive throughput and scalability required to meet its most demanding simulation apps with an all-flash architecture, resulting in 20x processing improvement, 600,000 IOPS, and 6GBs bandwidth.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Pure Storage
1 - 25 of 108 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement