application filtering

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution
    
Fortinet, Inc.
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
McAfee
Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education
    
Cisco
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database
    
Internap
Search      

Add Research

Get your company's research in the hands of targeted business professionals.