Business of Information Technology  >   Business Management  >   Content Management  >  

Secure Content Management

RSS Feed   
ALSO CALLED: Internet Content Filtering, Web Content Monitoring, e-Mail Content Security Management, Content Monitoring, Web Content Security, Content Filtering, Internet Content Monitoring, Web Content Filtering, Filtering, Email Content Security Management
DEFINITION: On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.  … 

Secure Content Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Secure Content Management Reports
1 - 25 of 68 Matches Previous Page  |  Next Page
The Benefits of a Software Defined Secure Branch with Versa Networks
sponsored by Verizon
WHITE PAPER: Adopting software defined secure branch gives organizations a network landscape that is built for the digital enterprises of today. In this white paper, discover the benefits of a software defined secure branch with Versa Networks.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Verizon

4 Critical Principles of Enterprise Security
sponsored by Smartsheet
WHITE PAPER: What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Smartsheet

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 14 Feb 2019 | Published: 31 May 2018

Arxan

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

ASICS Automates Incident Management and Resolution With Real-Time Log Analysis
sponsored by Splunk
CASE STUDY: In order for ASICS to combat cyberthreats and address incidents at the very moment they occur, ASICS required a central platform to manage, correlate and analyze logs generated from multiple systems. In this case study, learn about the ASICS' experience using Splunk Enterprise.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk

Today's State of Vulnerability Response: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

ServiceNow

Ten Strategies of a World-Class Security Operations Center
sponsored by Corelight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

Corelight

8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: In this resource, discover 8 reasons why LogRhythm customers made the switch from SIEMs. The top reasons include stopping the bad guys, saving time and resource drain, having a better user interface and more.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

LogRhythm, Inc.

Empowering Big Data in a Data-driven Economy
sponsored by Comforte AG
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Comforte AG

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
RESEARCH CONTENT: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Driving Radical Customer Service Innovation
sponsored by ServiceNow
EBOOK: Customer service has changed in recent years. Customers can voice their opinions easily over the internet, have more options, can leave vendors more easily and are demanding high-level customer service. Read this e-book to learn about how you can drive customer service innovation within your organization and keep your customers satisfied.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ServiceNow

Getting the Most From Collaboration
sponsored by Dropbox
WHITE PAPER: How do you combine the simplicity of cloud collaboration apps with enterprise-grade security? Download this white paper for an overview of leading collaboration platform, Dropbox Business, which enables organizations to gain control of shared data while meeting the security mandates that challenge enterprises of all sizes.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

Dropbox

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Splunk

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

ComputerWeekly.com

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

Project Success Plan: Rethinking Enterprise Content Management
sponsored by OpenText
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

OpenText

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Micron Technology
1 - 25 of 68 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement