Internet Filtering Research
-
Five tips to reduce risk from modern web threats
Sponsored by: SophosTo meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.
-
Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
Sponsored by: TechTarget SecurityMany organizations are moving malware protection to the Web and investing in Secure Web Gateways. This transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
-
GFI WebMonitor 2012
Sponsored by: GFI SoftwareHaving Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
-
The four rules of complete web protection
Sponsored by: SophosAs an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
-
Flushing Bank Invests in Internet Security with Webroot
Sponsored by: OpenText Security SolutionsNew York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.
-
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
Sponsored by: TechTarget SecurityToday’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
-
Leveraging security from the Cloud
Sponsored by: IBMCloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.
-
Five tips to reduce risk from modern web threats
Sponsored by: SophosUser education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
-
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It
Sponsored by: Bloxx, Inc.The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.
-
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Sponsored by: ImpervaICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
-
How to Gain Visibility and Control of Encrypted SSL Web Sessions
Sponsored by: BlueCoatBlue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.