ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Filtering Research

  • Content Filtering: Taming the Wild Web

    Sponsored by: SearchSecurity.com

    Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.

  • Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services

    Sponsored by: SearchSecurity.com

    Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Sponsored by: SearchSecurity.com

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • The four rules of complete web protection

    Sponsored by: Sophos

    As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.

  • Flushing Bank Invests in Internet Security with Webroot

    Sponsored by: Webroot

    New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

  • Leveraging security from the Cloud

    Sponsored by: IBM

    Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It

    Sponsored by: Bloxx, Inc.

    The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.

  • Importance of Web Application Firewall Technology for Protecting Web-based Resources

    Sponsored by: Imperva

    ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.

  • How to Gain Visibility and Control of Encrypted SSL Web Sessions

    Sponsored by: BlueCoat

    Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.