Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed   
Web Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Network security: public enemy number one
sponsored by ComputerWeekly.com
EGUIDE: In addition to regular network workloads, 83% of network teams also support security teams with the assorted network security issues that organisations face today. Discover in this e-guide why network security is the public enemy number one.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

ComputerWeekly.com

Security and Governance for Amazon S3 Data Lakes
sponsored by Okera
WHITE PAPER: In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.
Posted: 24 Jun 2019 | Published: 31 Mar 2019

Okera

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Fortune 100 Insurance Company Case Study
sponsored by CyberArk Software, Inc
CASE STUDY: Securing privileged access to robotic credentials was a top priority for the CVP of Privileged Access Management at a Fortune 100 Insurance Company. In this case study, learn how they implemented CyberArk Blue Prism integration to secure Robotic Process Automation (RPA) deployments and accelerate operational agility.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

CyberArk Software, Inc

Identity & Access Management – Securing the Modern Workplace With Microsoft 365
sponsored by Core BTS
WHITE PAPER: Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Core BTS

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Network Security Solutions for Government Agencies
sponsored by Gigamon
BROCHURE: As cyber threats evolve, governments in Asia-Pacific are introducing new measures for public agencies to step up protection against such attacks.. In this brief white paper, learn about the new measures public agencies are using to boost protection against attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Gigamon

2019 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT: In this 2019 Webroot Threat Report, it details the threat activity throughout 2018, and compares the data with that from years past. Tap into the report to get insights on how you can combat cybercrime today and in the future.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Webroot
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement