Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed   
Web Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

TOPICS: 
SearchSecurity.com

A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by CoreLight
WEBCAST: Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019

TOPICS: 
CoreLight

AutoNation Speedily Addresses Hygiene and Improves Endpoint Security
sponsored by Tanium
CASE STUDY: In an effort for AutoNation to improve visibility and patch management, they deployed Tanium's endpoint security platform. As a result, AutoNation accomplished a comprehensive security hygiene assessment that validated the suspected patching deficiencies of the existing software deployment process. Learn more in this case study.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

TOPICS: 
Datto, Inc.

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

TOPICS: 
Splunk

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Learn how your organization can achieve reduced alert noise, real-time threat monitoring, automated decision-making investigation, and more with this SIEM platform.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

TOPICS: 
Empow Cyber Security

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

TOPICS: 
ComputerWeekly.com

SD-WAN Use Case Profile Matrix: What's Driving SD-WAN Adoption?
sponsored by Telstra
WHITE PAPER: In this white paper, explore 6 reasons to switch to SD-WAN, and discover how different sectors are using the technology.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

TOPICS: 
Telstra

Simplify Bro Deployments with a Corelight Sensor
sponsored by CoreLight
PRODUCT OVERVIEW: Bro, now known as Zeek, is a framework for transforming network traffic into actionable data for analysis and more. Although it's relatively easy to get started with Bro, it's much more challenging to run the software efficiently and at scale. Read this white paper to learn about the Corelight Sensor, which is designed to simplify Bro deployments.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
CoreLight

3 Zero Trust Security Use Cases and How to Address Them
sponsored by Zscaler
RESOURCE: According to Forrester Research analysts, no user or network should be inherently trusted. Read this resource for 3 zero trust security use cases and how to address them.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

TOPICS: 
Zscaler
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement