Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Software

RSS Feed   
Web Filtering Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

TOPICS: 
SearchSecurity.com

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

TOPICS: 
Arctic Wolf

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

TOPICS: 
Veracode, Inc.

9 Metadata Network Security Use Cases
sponsored by Gigamon
WHITE PAPER: With some organizations running more than 2,000 unique applications and tools—which create terabytes of log data—finding anomalies can be difficult. Download this white paper to learn how Gigamon's security platform uses metadata from these applications to protect your organization, and explore use cases for metadata in security.
Posted: 05 Sep 2018 | Published: 31 Dec 2016

TOPICS: 
Gigamon

Research Study: Cloud-Based Business Solutions Suite Delivers Key Performance Improvements to Software Companies
sponsored by Oracle NetSuite
RESEARCH CONTENT: Download this study to examine what effect implementing NetSuite's cloud-based suite had on improving KPIs for software companies, as well as use cases for the platform.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

TOPICS: 
Oracle NetSuite

A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by CoreLight
WEBCAST: Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019

TOPICS: 
CoreLight

The Rise of Modern Systems of Agreement
sponsored by DocuSign, Inc.
WHITE PAPER: Every company has a System of Agreement (SofA)—the group of systems needed for preparing, signing, acting on, and managing agreements—but most have yet to be modernized. Download this white paper to learn about modernizing your SofA, and the benefits that come with doing so.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

TOPICS: 
DocuSign, Inc.

How Strategists Can Use the Cloud to Delight Customers
sponsored by Magenic
WHITE PAPER: Flip through a collection of cloud innovation stories from real companies like Domino's Pizza and Deloitte to find out how they leveraged cloud applications to transform their business model – and usher in new eras of growth.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Magenic

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 04 Jan 2019 | Published: 04 Jan 2019

TOPICS: 
ComputerWeekly.com

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

TOPICS: 
Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement