Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Tools

RSS Feed   
Web Filtering Tools Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

TOPICS: 
SearchSecurity.com

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

TOPICS: 
ComputerWeekly.com

The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018
sponsored by Security Scorecard
RESEARCH CONTENT: According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.
Posted: 11 Feb 2019 | Published: 13 Nov 2018

TOPICS: 
Security Scorecard

Simplify Bro Deployments with a Corelight Sensor
sponsored by CoreLight
PRODUCT OVERVIEW: Bro, now known as Zeek, is a framework for transforming network traffic into actionable data for analysis and more. Although it's relatively easy to get started with Bro, it's much more challenging to run the software efficiently and at scale. Read this white paper to learn about the Corelight Sensor, which is designed to simplify Bro deployments.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
CoreLight

CW ANZ: Taming the data beast
sponsored by ComputerWeekly.com
EZINE: Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

TOPICS: 
ComputerWeekly.com

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by CoreLight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

TOPICS: 
CoreLight

Continuous Testing in Micro Focus
sponsored by Micro Focus_Infosys
WHITE PAPER: Download this guide for tips on how to achieve success with continuous testing, through a combination of process and technical enablers – from testing baked into user stories, to manual testing and automated infrastructure.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

TOPICS: 
Micro Focus_Infosys

AutoNation Speedily Addresses Hygiene and Improves Endpoint Security
sponsored by Tanium
CASE STUDY: In an effort for AutoNation to improve visibility and patch management, they deployed Tanium's endpoint security platform. As a result, AutoNation accomplished a comprehensive security hygiene assessment that validated the suspected patching deficiencies of the existing software deployment process. Learn more in this case study.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Learn how your organization can achieve reduced alert noise, real-time threat monitoring, automated decision-making investigation, and more with this SIEM platform.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

TOPICS: 
Empow Cyber Security

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Gigamon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement