Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed   
Web Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

The 2021 State Of Open Source Vulnerabilities
sponsored by Fossa
RESEARCH CONTENT: Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Fossa

SASE as a Gradual Deployment
sponsored by Cato Networks
WHITE PAPER: Gartner recently introduced a new architecture called SASE that converges networking and security capabilities. Moving to a new architecture can be daunting, which is why any SASE architecture should support enterprises moving at their own pace. In this white paper, explore 5 use cases of gradual deployment that a SASE architecture should support.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

IT Managers Share Lessons Learned from Shifting to Work-from-Home
sponsored by Cato Networks
WHITE PAPER: The global COVID-19 pandemic exploded suddenly, with an unprecedented impact on enterprise work styles. In a matter of days, thousands of organizations had to shift to a remote workforce. In this white paper, find out how 3 organizations were able to ramp up their COVID-19 WFH strategy fast and seamlessly with the help of Cato’s SASE platform.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences