Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Filtering Tools

RSS Feed   
Web Filtering Tools Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

BotRx ProTx Mobile Application Security
sponsored by BotRX
DATA SHEET: Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

Securosis: Network Operations and Security Professionals' Guide to Managing Public Cloud Journeys
sponsored by Gigamon
WHITE PAPER: Your cloud journey is unique, but a new guide shows there are common patterns that steer you to the best approach for a successful outcome. Learn which cloud adoption pattern your organization aligns with, key risks, recommendations and important questions to ask yourself at each stage of your journey.
Posted: 16 Sep 2020 | Published: 01 Mar 2020

Gigamon

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Debunking Software Asset Management Myths
sponsored by MetrixData 360
WHITE PAPER: Software asset management can be seen as both more complex than IT asset management and less necessary, but neither of these assumptions are true. Read on to learn why software asset management is more than an expensive luxury—it’s a necessary tool that can save you time, money, and headache down the line.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

MetrixData 360

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info