Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed   
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 

Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Secure Content Management Reports
1 - 25 of 84 Matches Previous Page  |  Next Page
In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

The Cognitive Step — How Search Will Improve
sponsored by Attivio, Inc.
WHITE PAPER: This paper explores the shift being driven by increased demand and expectations among those who rely on search-based solutions, and the emerging technologies that are helping solve big data challenges.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Attivio, Inc.

Secure and Manage Mobile Devices, Desktops, Apps and Content
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover how to secure corporate data, drive employee productivity, and enable business innovation with an EMM system that meets both user demands and IT security requirements.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

MobileIron

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Security's New Frontier: The Cloud
sponsored by Cisco Umbrella
EBOOK: By 2018, SaaS usage is expected to increase 70% and security can't wait any longer. Inside this e-book, uncover how to securely adopt and use the cloud to better manage security policies and gain visibility beyond the perimeter.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Cisco Umbrella

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this white paper for 4 best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

ComputerWeekly.com

4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Recommendations for Secure Policy Configuration Assessment
sponsored by FireMon
WHITE PAPER: According to Gartner, secure configuration assessment is essential for identifying risks arising out of weak and misconfigured systems and devices. This resource offers strategies for achieving Gartner's 4 recommendations for secure policy configuration assessment.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

FireMon

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

Enable Enterprise Collaboration with a File Sharing Plan
sponsored by SkySync
WHITE PAPER: Today's workforce requires a file sharing plan that enables enterprise-wide collaboration, but this could put your data in jeopardy. This white paper examines the top security threats surrounding file sharing and how your organization can lay out a roadmap to navigate these challenges, enabling safe collaboration with hybrid cloud.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

SkySync

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE: This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Project Success Plan: Rethinking Enterprise Content Management
sponsored by OpenText
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

OpenText

2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Micron Technology

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

Next-Generation Security in a Mobile Era
sponsored by SearchCIO.com
EBOOK: Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchCIO.com

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Market Trends - Secure File Sharing and Collaboration in the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions.
Posted: 02 Jun 2014 | Published: 04 Feb 2014

Accellion, Inc.
1 - 25 of 84 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement