Web Content Monitoring Reports

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Meeting Branch Office Business Needs for Security and Networking
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Download this white paper and discover an ideal branch-office security strategy that provides fast and secure site-to-site VPN connections. You will also learn about effective tactics that help stop viruses, worms, Spyware and other threats.
Posted: 30 Aug 2006 | Published: 01 Jul 2006

Juniper Networks, Inc.

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
sponsored by Astaro
CASE STUDY: Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky

Mobile Device Security Overview
sponsored by TechTarget Security
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

TechTarget Security