Internet Content Filtering Reports

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Micron Technology

Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008

Imperva

Mobile Device Security Overview
sponsored by TechTarget Security
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

TechTarget Security

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Security Analysis Principles and Techniques for IT Pros
sponsored by TechTarget Security
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

TechTarget Security

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com