Internet Content Monitoring Reports

Security Analysis Principles and Techniques for IT Pros
sponsored by TechTarget Security
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

TechTarget Security

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by TechTarget Security
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

TechTarget Security

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Success Story: Astaro Gets the Checkered Flag at F1 Boston
sponsored by Astaro
CASE STUDY: New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

IBM

Sleeping Android: the danger of dormant permissions
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

TechTarget ComputerWeekly.com

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by TechTarget Security
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TechTarget Security