Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Software

RSS Feed   
Web Filtering Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

15 Experts' Questions and Answers about SASE
sponsored by Cato Networks
WHITE PAPER: SASE is, in brief, a new enterprise networking technology category introduced by Gartner in 2019. SASE solutions are cloud services that connect and secure all enterprises “edges” – datacenters, branch offices, mobile uses, and cloud resources. To learn more about SASE and explore an expert Q&A, check out this white paper.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Building The Future Workplace In Businesses Services
sponsored by Ingram Micro
WHITE PAPER: With employees working both on-site and at home, businesses leaders need to make sure everyone can work productively and securely, no matter where they’re located. In this white paper, learn how Ingram Micro and Cisco can help organizations empower and secure their remote workforce.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Ingram Micro

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture
sponsored by iBoss
WHITE PAPER: Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

Lightboard Video - Automate Connectivity to Cloud Networking With SD-WAN
sponsored by Silver Peak
VIDEO: In the past, businesses moving workloads to the cloud would use a side-to-side IPsec VPN as the carrier. But this traditional VPN configuration model is manual and doesn't scale. Watch this video to learn how Silver Peak Unity EdgeConnect SD-WAN strives to automate secure connectivity to cloud providers including AWS, Azure, Google and Oracle.
Posted: 24 Feb 2021 | Premiered: 24 Feb 2021

Silver Peak

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info