Storage Technology Research Library

Powered by Bitpipe.com

Internet FilteringResearch

  • What's Wrong with Traditional Firewalls? (Edu)

    Sponsored by: Dell Software

    Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.

  • SearchSecurity.com University

    Sponsored by: SearchSecurity.com

    With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.

  • How traditional firewalls fail

    Sponsored by: Dell Software

    Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos, Inc.

    To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

  • Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services

    Sponsored by: Websense, Inc.

    Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • The four rules of complete web protection

    Sponsored by: Sophos, Inc.

    As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.

  • Deliver the Web Access Your Users Want With the Control You Need

    Sponsored by: BlueCoat

    URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.

  • Flushing Bank Invests in Internet Security with Webroot

    Sponsored by: Webroot

    New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

  • Web Filtering: An Essential Part of a Consolidated Security System

    Sponsored by: Fortinet, Inc.

    In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Sponsored by: BlueCoat

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

  • Corporate Web Security - Market Quadrant 2011

    Sponsored by: BlueCoat

    Web threats continue to evolve so its essential to have a robust Web security to help secure and manage the Web traffic of your organization. This report evaluates leading corporate Web security solutions in the market. Explore how each performed based on key functions including malware protection, URL filtering and data loss prevention.

  • Leveraging security from the Cloud

    Sponsored by: IBM

    Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos, Inc.

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • Top 5 Considerations for Choosing a Next-Generation Firewall: SonicWALL vs. Palo Alto Networks and Fortinet

    Sponsored by: SonicWALL

    Thanks to Web 2.0 and an explosion of Web-based applications, nearly two-thirds of today's traffic is HTTP and HTTPS. Collaboration, increased productivity and improved insights into customers and prospects are all key benefits of Web 2.0.  But with these benefits come new security threats as well as dramatic increases in network bandwidth consumed

  • Is Your Acceptable Use Policy Social Media-proof?

    Sponsored by: M86 Security

    This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.

  • The Top Six Risks of Employee Internet Use and How to Stop Them

    Sponsored by: St. Bernard Software

    Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.

  • Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It

    Sponsored by: Bloxx, Inc.

    The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.

  • All-in-One Internet Filtering Solution Solves Costly Problems for Easton Bell Sports

    Sponsored by: Bloxx, Inc.

    Easton-Bell Sports was growing increasingly concerned about its bandwidth consumption, as well as the time IT staff members were spending removing malware from employees' computers.

  • Importance of Web Application Firewall Technology for Protecting Web-based Resources

    Sponsored by: Imperva

    ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.

  • The Top Six Risks of Employee Internet Use and How to Stop Them

    Sponsored by: St. Bernard Software

    Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.

  • How to Gain Visibility and Control of Encrypted SSL Web Sessions

    Sponsored by: BlueCoat

    Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.

  • Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)

    Sponsored by: Symantec Hosted Services

    What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...

  • Protecting Organizations from Spyware

    Sponsored by: Websense, Inc.

    The internet has become a critical resource employees rely on to get their jobs done. Employees use the web to perform research and gather information. Learn about the risks associated with these activities.

  • Protecting against Complex Internet Threats

    Sponsored by: Websense, Inc.

    Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Storage Technology Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.