Filtering Reports

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Next-Generation Security in a Mobile Era
sponsored by TechTarget CIO
EBOOK: Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TechTarget CIO

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

Sleeping Android: the danger of dormant permissions
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

TechTarget ComputerWeekly.com

Technical guide on Web Security Gateways
sponsored by TechTarget Security
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

TechTarget Security

Best Practices for Preventing Malware
sponsored by TechTarget Security
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

TechTarget Security

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox