Secure Content Management Research
-
Best Practices for Preventing Malware
Sponsored by: TechTarget SecurityPreventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
-
Mobile Device Security Overview
Sponsored by: TechTarget SecurityThis expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
-
Expert Guide to web 2.0 Threats: How to Prevent an Attack
Sponsored by: TechTarget SecurityA majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
-
E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
Sponsored by: TechTarget SecurityThis expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
-
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
Sponsored by: TechTarget SecurityToday’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
-
Technical guide on Web Security Gateways
Sponsored by: TechTarget SecurityMalicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
-
TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
Sponsored by: TITUSRead this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
-
Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
Sponsored by: Cisco Systems, Inc.This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
-
Success Story: Astaro Gets the Checkered Flag at F1 Boston
Sponsored by: AstaroNew England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.
-
Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
Sponsored by: AstaroMedical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
-
Accelerated Transactions, Increased Security a Bullseye for Dart Transit Company, Trading Partners
Sponsored by: EXTOL International, Inc.Read this brief white paper to learn how Dart Transit Company implemented an electronic data interchange strategy (EDI) that offers faster, more secure data transactions for their trading partner interactions, and more effective automation tools to manage the business integration process.
-
Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
Sponsored by: Cisco Systems, Inc.This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
-
EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
Sponsored by: Oracle CorporationIT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
Sponsored by: Symantec CorporationThis presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
-
Security through Maturity: A Brief on Securing iSCSI Networks
Sponsored by: DellEMC and Intel®Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
-
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Sponsored by: ImpervaICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
-
Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
Sponsored by: Aladdin Knowledge SystemsThis white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
-
Optim Data Privacy Solution
Sponsored by: IBMThe Optim Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
-
Entrust Entelligence™ Messaging Server
Sponsored by: Entrust, Inc.The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
-
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
Sponsored by: Symantec CorporationThis paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
-
Symantec Mail Security for SMTP 5.0
Sponsored by: Symantec CorporationThis white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
-
Symantec Mail Security for SMTP
Sponsored by: Symantec CorporationTry this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
-
Mail Security for Microsoft Exchange Server
Sponsored by: Symantec CorporationThis Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.